core_rule.sh 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. # Copyright (C) 2009-2010 OpenWrt.org
  2. fw_config_get_rule() {
  3. [ "${rule_NAME}" != "$1" ] || return
  4. fw_config_get_section "$1" rule { \
  5. string _name "$1" \
  6. string name "" \
  7. string src "" \
  8. ipaddr src_ip "" \
  9. string src_mac "" \
  10. string src_port "" \
  11. string dest "" \
  12. ipaddr dest_ip "" \
  13. string dest_port "" \
  14. string icmp_type "" \
  15. string proto "tcpudp" \
  16. string target "" \
  17. string family "" \
  18. string limit "" \
  19. string limit_burst "" \
  20. string extra "" \
  21. } || return
  22. [ -n "$rule_name" ] || rule_name=$rule__name
  23. }
  24. fw_load_rule() {
  25. fw_config_get_rule "$1"
  26. [ "$rule_target" != "NOTRACK" ] || [ -n "$rule_src" ] || [ "$rule_src" != "*" ] || {
  27. fw_log error "NOTRACK rule ${rule_name}: needs src, skipping"
  28. return 0
  29. }
  30. fw_callback pre rule
  31. local table=f
  32. local chain=input
  33. local target="${rule_target:-REJECT}"
  34. if [ "$target" == "NOTRACK" ]; then
  35. table=r
  36. chain="zone_${rule_src}_notrack"
  37. else
  38. if [ -n "$rule_src" ]; then
  39. if [ "$rule_src" != "*" ]; then
  40. chain="zone_${rule_src}${rule_dest:+_forward}"
  41. else
  42. chain="${rule_dest:+forward}"
  43. chain="${chain:-input}"
  44. fi
  45. fi
  46. if [ -n "$rule_dest" ]; then
  47. if [ "$rule_dest" != "*" ]; then
  48. target="zone_${rule_dest}_${target}"
  49. elif [ "$target" = REJECT ]; then
  50. target=reject
  51. fi
  52. fi
  53. fi
  54. local mode
  55. fw_get_family_mode mode ${rule_family:-x} "$rule_src" I
  56. local src_spec dest_spec
  57. fw_get_negation src_spec '-s' "${rule_src_ip:+$rule_src_ip/$rule_src_ip_prefixlen}"
  58. fw_get_negation dest_spec '-d' "${rule_dest_ip:+$rule_dest_ip/$rule_dest_ip_prefixlen}"
  59. [ "$rule_proto" == "tcpudp" ] && rule_proto="tcp udp"
  60. local pr; for pr in $rule_proto; do
  61. local sports dports itypes
  62. case "$pr" in
  63. icmp|icmpv6|1|58)
  64. sports=""; dports=""
  65. itypes="$rule_icmp_type"
  66. ;;
  67. *)
  68. sports="$rule_src_port"
  69. dports="$rule_dest_port"
  70. itypes=""
  71. ;;
  72. esac
  73. fw_get_negation pr '-p' "$pr"
  74. local sp; for sp in ${sports:-""}; do
  75. fw_get_port_range sp $sp
  76. fw_get_negation sp '--sport' "$sp"
  77. local dp; for dp in ${dports:-""}; do
  78. fw_get_port_range dp $dp
  79. fw_get_negation dp '--dport' "$dp"
  80. local sm; for sm in ${rule_src_mac:-""}; do
  81. fw_get_negation sm '--mac-source' "$sm"
  82. local it; for it in ${itypes:-""}; do
  83. fw_get_negation it '--icmp-type' "$it"
  84. fw add $mode $table $chain $target + \
  85. { $rule_src_ip $rule_dest_ip } { \
  86. $src_spec $dest_spec \
  87. $pr $sp $dp $it \
  88. ${sm:+-m mac $sm} \
  89. ${rule_limit:+-m limit --limit $rule_limit \
  90. ${rule_limit_burst:+--limit-burst $rule_limit_burst}} \
  91. $rule_extra \
  92. }
  93. done
  94. done
  95. done
  96. done
  97. done
  98. fw_callback post rule
  99. }