projects
/
project
/
firewall3.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Reapply SNAT/MASQUERADE rules on firewall reloads
[project/firewall3.git]
/
ipsets.c
diff --git
a/ipsets.c
b/ipsets.c
index 955d4349875f279f4857c8accce788920de42b0b..8f88885546c68bb16f124294c51b073d10be68a2 100644
(file)
--- a/
ipsets.c
+++ b/
ipsets.c
@@
-107,6
+107,11
@@
check_types(struct uci_element *e, struct fw3_ipset *ipset)
{
for (i = 0; i < ARRAY_SIZE(ipset_types); i++)
{
{
for (i = 0; i < ARRAY_SIZE(ipset_types); i++)
{
+ /* skip type for v6 if it does not support family */
+ if (ipset->family != FW3_FAMILY_V4 &&
+ !(ipset_types[i].optional & OPT_FAMILY))
+ continue;
+
if (ipset_types[i].types == typelist)
{
ipset->method = ipset_types[i].method;
if (ipset_types[i].types == typelist)
{
ipset->method = ipset_types[i].method;
@@
-259,6
+264,10
@@
fw3_load_ipsets(struct fw3_state *state, struct uci_package *p)
{
warn_elem(e, "must not have family 'any'");
}
{
warn_elem(e, "must not have family 'any'");
}
+ else if (ipset->iprange.set && ipset->family != ipset->iprange.family)
+ {
+ warn_elem(e, "has iprange of wrong address family");
+ }
else if (list_empty(&ipset->datatypes))
{
warn_elem(e, "has no datatypes assigned");
else if (list_empty(&ipset->datatypes))
{
warn_elem(e, "has no datatypes assigned");
@@
-281,9
+290,6
@@
create_ipset(struct fw3_ipset *ipset, struct fw3_state *state)
struct fw3_ipset_datatype *type;
struct fw3_ipset_datatype *type;
- if (ipset->external)
- return;
-
info(" * Creating ipset %s", ipset->name);
first = true;
info(" * Creating ipset %s", ipset->name);
first = true;
@@
-295,6
+301,9
@@
create_ipset(struct fw3_ipset *ipset, struct fw3_state *state)
first = false;
}
first = false;
}
+ if (ipset->method == FW3_IPSET_METHOD_HASH)
+ fw3_pr(" family inet%s", (ipset->family == FW3_FAMILY_V4) ? "" : "6");
+
if (ipset->iprange.set)
{
fw3_pr(" range %s", fw3_address_to_string(&ipset->iprange, false));
if (ipset->iprange.set)
{
fw3_pr(" range %s", fw3_address_to_string(&ipset->iprange, false));
@@
-305,8
+314,6
@@
create_ipset(struct fw3_ipset *ipset, struct fw3_state *state)
ipset->portrange.port_min, ipset->portrange.port_max);
}
ipset->portrange.port_min, ipset->portrange.port_max);
}
- fw3_pr(" family inet%s", (ipset->family == FW3_FAMILY_V4) ? "" : "6");
-
if (ipset->timeout > 0)
fw3_pr(" timeout %u", ipset->timeout);
if (ipset->timeout > 0)
fw3_pr(" timeout %u", ipset->timeout);
@@
-325,31
+332,86
@@
create_ipset(struct fw3_ipset *ipset, struct fw3_state *state)
void
fw3_create_ipsets(struct fw3_state *state)
{
void
fw3_create_ipsets(struct fw3_state *state)
{
+ int tries;
+ bool exec = false;
struct fw3_ipset *ipset;
if (state->disable_ipsets)
return;
struct fw3_ipset *ipset;
if (state->disable_ipsets)
return;
+ /* spawn ipsets */
list_for_each_entry(ipset, &state->ipsets, list)
list_for_each_entry(ipset, &state->ipsets, list)
+ {
+ if (ipset->external)
+ continue;
+
+ if (!exec)
+ {
+ exec = fw3_command_pipe(false, "ipset", "-exist", "-");
+
+ if (!exec)
+ return;
+ }
+
create_ipset(ipset, state);
create_ipset(ipset, state);
+ }
+
+ if (exec)
+ {
+ fw3_pr("quit\n");
+ fw3_command_close();
+ }
+
+ /* wait for ipsets to appear */
+ list_for_each_entry(ipset, &state->ipsets, list)
+ {
+ if (ipset->external)
+ continue;
- fw3_pr("quit\n");
+ for (tries = 0; !fw3_check_ipset(ipset) && tries < 10; tries++)
+ usleep(50000);
+ }
}
void
fw3_destroy_ipsets(struct fw3_state *state)
{
}
void
fw3_destroy_ipsets(struct fw3_state *state)
{
- struct fw3_ipset *s;
+ int tries;
+ bool exec = false;
+ struct fw3_ipset *ipset;
- list_for_each_entry(s, &state->ipsets, list)
+ /* destroy ipsets */
+ list_for_each_entry(ipset, &state->ipsets, list)
{
{
- info(" * Deleting ipset %s", s->name);
+ if (!exec)
+ {
+ exec = fw3_command_pipe(false, "ipset", "-exist", "-");
+
+ if (!exec)
+ return;
+ }
- fw3_pr("flush %s\n", s->name);
- fw3_pr("destroy %s\n", s->name);
+ info(" * Deleting ipset %s", ipset->name);
+
+ fw3_pr("flush %s\n", ipset->name);
+ fw3_pr("destroy %s\n", ipset->name);
}
}
- fw3_pr("quit\n");
+ if (exec)
+ {
+ fw3_pr("quit\n");
+ fw3_command_close();
+ }
+
+ /* wait for ipsets to disappear */
+ list_for_each_entry(ipset, &state->ipsets, list)
+ {
+ if (ipset->external)
+ continue;
+
+ for (tries = 0; fw3_check_ipset(ipset) && tries < 10; tries++)
+ usleep(50000);
+ }
}
struct fw3_ipset *
}
struct fw3_ipset *