2015-06-08 21:10:21 +02:00
|
|
|
#!/bin/bash
|
2018-06-23 17:29:01 +02:00
|
|
|
# The Shoreline Firewall (Shorewall) Packet Filtering Firewall - V5.2
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
# (c) 2012-2014 - Tom Eastep (teastep@shorewall.net)
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
# On most distributions, this file should be called
|
|
|
|
# /etc/init.d/shorewall.
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2020-03-26 22:58:35 +01:00
|
|
|
# Complete documentation is available at https://shorewall.org
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
# This program is part of Shorewall.
|
2014-01-04 18:48:27 +01:00
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or modify
|
2015-06-08 21:10:21 +02:00
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 2 of the license or,
|
|
|
|
# at your option, any later version.
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2014-01-04 18:48:27 +01:00
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2014-01-04 18:48:27 +01:00
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
###############################################################################
|
2013-08-20 22:06:25 +02:00
|
|
|
# set the STATEDIR variable
|
2020-04-20 19:29:36 +02:00
|
|
|
|
2013-08-20 22:06:25 +02:00
|
|
|
setstatedir() {
|
|
|
|
local statedir
|
|
|
|
if [ -f ${CONFDIR}/${PRODUCT}/vardir ]; then
|
|
|
|
statedir=$( . /${CONFDIR}/${PRODUCT}/vardir && echo $VARDIR )
|
|
|
|
fi
|
|
|
|
|
2014-11-24 08:43:32 +01:00
|
|
|
[ -n "$statedir" ] && STATEDIR=${statedir} || STATEDIR=${VARLIB}/${PRODUCT}
|
2013-08-20 22:06:25 +02:00
|
|
|
|
2017-12-18 19:25:56 +01:00
|
|
|
if [ -x ${STATEDIR}/firewall ]; then
|
2018-01-12 18:11:09 +01:00
|
|
|
return 0
|
2017-12-18 19:25:56 +01:00
|
|
|
elif [ $PRODUCT = shorewall ]; then
|
2016-12-01 00:04:40 +01:00
|
|
|
${SBINDIR}/shorewall compile
|
|
|
|
elif [ $PRODUCT = shorewall6 ]; then
|
|
|
|
${SBINDIR}/shorewall -6 compile
|
2013-08-20 22:06:25 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2020-04-20 19:29:36 +02:00
|
|
|
# Initialize the firewalls
|
|
|
|
|
|
|
|
shorewall_init_start () {
|
2015-06-08 21:10:21 +02:00
|
|
|
local PRODUCT
|
|
|
|
local STATEDIR
|
|
|
|
|
2016-12-28 20:09:08 +01:00
|
|
|
printf "Initializing \"Shorewall-based firewalls\": "
|
2020-04-20 18:23:34 +02:00
|
|
|
|
|
|
|
if [ -n "$SAVE_IPSETS" -a -f "$SAVE_IPSETS" ]; then
|
|
|
|
ipset -R < "$SAVE_IPSETS"
|
|
|
|
fi
|
|
|
|
|
2015-06-08 21:10:21 +02:00
|
|
|
for PRODUCT in $PRODUCTS; do
|
2015-06-08 21:15:35 +02:00
|
|
|
if setstatedir; then
|
2017-12-18 19:25:56 +01:00
|
|
|
#
|
|
|
|
# Run in a sub-shell to avoid name collisions
|
|
|
|
#
|
|
|
|
(
|
|
|
|
if ! ${STATEDIR}/firewall status > /dev/null 2>&1; then
|
|
|
|
${STATEDIR}/firewall ${OPTIONS} stop
|
|
|
|
fi
|
|
|
|
)
|
2015-06-08 21:10:21 +02:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
return 0
|
2012-02-29 17:39:27 +01:00
|
|
|
}
|
|
|
|
|
2020-04-20 19:29:36 +02:00
|
|
|
# Clear the firewalls
|
|
|
|
|
|
|
|
shorewall_init_stop () {
|
2015-06-08 21:10:21 +02:00
|
|
|
local PRODUCT
|
|
|
|
local STATEDIR
|
|
|
|
|
2016-12-28 20:09:08 +01:00
|
|
|
printf "Clearing \"Shorewall-based firewalls\": "
|
2020-04-20 19:29:36 +02:00
|
|
|
|
2015-06-08 21:10:21 +02:00
|
|
|
for PRODUCT in $PRODUCTS; do
|
2015-06-08 21:15:35 +02:00
|
|
|
if setstatedir; then
|
2020-04-16 19:59:29 +02:00
|
|
|
#
|
|
|
|
# Run in sub-shell to avoid name collisions
|
|
|
|
#
|
|
|
|
(
|
|
|
|
if ! ${STATEDIR}/firewall status > /dev/null 2>&1; then
|
|
|
|
${STATEDIR}/firewall ${OPTIONS} clear
|
|
|
|
fi
|
|
|
|
)
|
2015-06-08 21:10:21 +02:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ -n "$SAVE_IPSETS" ]; then
|
|
|
|
mkdir -p $(dirname "$SAVE_IPSETS")
|
|
|
|
if ipset -S > "${SAVE_IPSETS}.tmp"; then
|
2017-09-12 20:56:24 +02:00
|
|
|
grep -qE -- '^(-N|create )' "${SAVE_IPSETS}.tmp" && mv -f "${SAVE_IPSETS}.tmp" "$SAVE_IPSETS" || rm -f "${SAVE_IPSETS}.tmp"
|
|
|
|
else
|
|
|
|
rm -f "${SAVE_IPSETS}.tmp"
|
2015-06-08 21:10:21 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
return 0
|
2012-02-29 17:39:27 +01:00
|
|
|
}
|
|
|
|
|
2020-04-24 03:37:47 +02:00
|
|
|
#
|
|
|
|
# This is modified by the installer when ${SHAREDIR} <> /usr/share
|
|
|
|
#
|
|
|
|
. /usr/share/shorewall/shorewallrc
|
|
|
|
|
|
|
|
# check if shorewall-init is configured or not
|
|
|
|
if [ -f "$SYSCONFDIR/shorewall-init" ]; then
|
|
|
|
. $SYSCONFDIR/shorewall-init
|
|
|
|
if [ -z "$PRODUCTS" ]; then
|
|
|
|
echo "ERROR: No products configured" >&2
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
echo "ERROR: ${SYSCONFDIR}/shorewall-init not found" >&2
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2012-02-29 17:39:27 +01:00
|
|
|
case "$1" in
|
2015-06-08 21:10:21 +02:00
|
|
|
start)
|
2020-04-20 19:29:36 +02:00
|
|
|
shorewall_init_start
|
2015-06-08 21:10:21 +02:00
|
|
|
;;
|
|
|
|
stop)
|
2020-04-20 19:29:36 +02:00
|
|
|
shorewall_init_stop
|
2015-06-08 21:10:21 +02:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo "Usage: $0 {start|stop}"
|
|
|
|
exit 1
|
2012-02-29 17:39:27 +01:00
|
|
|
esac
|
|
|
|
|
|
|
|
exit 0
|