mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-18 03:29:12 +01:00
Remove SUBSYSLOCK
Signed-off-by: Tom Eastep <teastep@shorewall.net>
This commit is contained in:
parent
ce68f84d9d
commit
386b137e9b
@ -426,9 +426,6 @@ fi
|
|||||||
|
|
||||||
if [ $HOST = archlinux ] ; then
|
if [ $HOST = archlinux ] ; then
|
||||||
sed -e 's!LOGFILE=/var/log/messages!LOGFILE=/var/log/messages.log!' -i ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
sed -e 's!LOGFILE=/var/log/messages!LOGFILE=/var/log/messages.log!' -i ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
||||||
elif [ $HOST = gentoo ]; then
|
|
||||||
# Adjust SUBSYSLOCK path (see https://bugs.gentoo.org/show_bug.cgi?id=459316)
|
|
||||||
perl -p -w -i -e "s|^SUBSYSLOCK=.*|SUBSYSLOCK=/run/lock/$PRODUCT|;" ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
|
||||||
fi
|
fi
|
||||||
#
|
#
|
||||||
# Install the default config path file
|
# Install the default config path file
|
||||||
@ -563,7 +560,7 @@ if [ $configure -eq 1 -a -z "$DESTDIR" -a -n "$first_install" -a -z "${cygwin}${
|
|||||||
if [ $HOST = debian ]; then
|
if [ $HOST = debian ]; then
|
||||||
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
||||||
touch /var/log/$PRODUCT-init.log
|
touch /var/log/$PRODUCT-init.log
|
||||||
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;s/^SUBSYSLOCK=.*/SUBSYSLOCK=/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
||||||
else
|
else
|
||||||
echo "Set STARTUP_ENABLED=Yes in ${CONFDIR}/$PRODUCT/$PRODUCT.conf to enable"
|
echo "Set STARTUP_ENABLED=Yes in ${CONFDIR}/$PRODUCT/$PRODUCT.conf to enable"
|
||||||
fi
|
fi
|
||||||
@ -582,7 +579,7 @@ if [ $configure -eq 1 -a -z "$DESTDIR" -a -n "$first_install" -a -z "${cygwin}${
|
|||||||
echo "$PRODUCT will start automatically at boot"
|
echo "$PRODUCT will start automatically at boot"
|
||||||
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
||||||
touch /var/log/$PRODUCT-init.log
|
touch /var/log/$PRODUCT-init.log
|
||||||
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;s/^SUBSYSLOCK=.*/SUBSYSLOCK=/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
||||||
update-rc.d $PRODUCT enable
|
update-rc.d $PRODUCT enable
|
||||||
elif mywhich rc-update ; then
|
elif mywhich rc-update ; then
|
||||||
if rc-update add $PRODUCT default; then
|
if rc-update add $PRODUCT default; then
|
||||||
@ -590,7 +587,7 @@ if [ $configure -eq 1 -a -z "$DESTDIR" -a -n "$first_install" -a -z "${cygwin}${
|
|||||||
if [ $HOST = debian ]; then
|
if [ $HOST = debian ]; then
|
||||||
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
||||||
touch /var/log/$PRODUCT-init.log
|
touch /var/log/$PRODUCT-init.log
|
||||||
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;s/^SUBSYSLOCK=.*/SUBSYSLOCK=/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
||||||
else
|
else
|
||||||
echo "Set STARTUP_ENABLED=Yes in ${CONFDIR}/$PRODUCT/$PRODUCT.conf to enable"
|
echo "Set STARTUP_ENABLED=Yes in ${CONFDIR}/$PRODUCT/$PRODUCT.conf to enable"
|
||||||
fi
|
fi
|
||||||
|
@ -133,20 +133,6 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term><emphasis
|
|
||||||
role="bold">SUBSYSLOCK=</emphasis>[<emphasis>pathname</emphasis>]</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>This parameter should be set to the name of a file that the
|
|
||||||
firewall should create if it starts successfully and remove when it
|
|
||||||
stops. Creating and removing this file allows Shorewall to work with
|
|
||||||
your distribution's initscripts. For RedHat, this should be set to
|
|
||||||
/var/lock/subsys/shorewall. For Debian, the value is
|
|
||||||
/var/state/shorewall and in LEAF it is /var/run/shorewall.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term>VERBOSITY=[<emphasis role="bold">number</emphasis>]</term>
|
<term>VERBOSITY=[<emphasis role="bold">number</emphasis>]</term>
|
||||||
|
|
||||||
|
@ -40,8 +40,6 @@ PATH=
|
|||||||
|
|
||||||
SHOREWALL_SHELL=
|
SHOREWALL_SHELL=
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
RESTOREFILE=
|
RESTOREFILE=
|
||||||
|
|
||||||
#LAST LINE -- DO NOT REMOVE
|
#LAST LINE -- DO NOT REMOVE
|
||||||
|
@ -315,7 +315,7 @@ our %renamed = ( AUTO_COMMENT => 'AUTOCOMMENT', BLACKLIST_LOGLEVEL => 'BLACKLIST
|
|||||||
#
|
#
|
||||||
# Config options and global settings that are to be copied to output script
|
# Config options and global settings that are to be copied to output script
|
||||||
#
|
#
|
||||||
our @propagateconfig = qw/ DISABLE_IPV6 MODULESDIR MODULE_SUFFIX LOAD_HELPERS_ONLY LOCKFILE SUBSYSLOCK LOG_VERBOSITY RESTART/;
|
our @propagateconfig = qw/ DISABLE_IPV6 MODULESDIR MODULE_SUFFIX LOAD_HELPERS_ONLY LOCKFILE LOG_VERBOSITY RESTART/;
|
||||||
#
|
#
|
||||||
# From parsing the capabilities file or detecting capabilities
|
# From parsing the capabilities file or detecting capabilities
|
||||||
#
|
#
|
||||||
@ -636,14 +636,15 @@ our %converted = (
|
|||||||
# Eliminated options
|
# Eliminated options
|
||||||
#
|
#
|
||||||
our %eliminated = ( LOGRATE => 1,
|
our %eliminated = ( LOGRATE => 1,
|
||||||
LOGBURST => 1,
|
LOGBURST => 1,
|
||||||
EXPORTPARAMS => 1,
|
EXPORTPARAMS => 1,
|
||||||
LEGACY_FASTSTART => 1,
|
LEGACY_FASTSTART => 1,
|
||||||
IPSECFILE => 1,
|
IPSECFILE => 1,
|
||||||
WIDE_TC_MARKS => 1,
|
WIDE_TC_MARKS => 1,
|
||||||
HIGH_ROUTE_MARKS => 1,
|
HIGH_ROUTE_MARKS => 1,
|
||||||
BLACKLISTNEWONLY => 1,
|
BLACKLISTNEWONLY => 1,
|
||||||
CHAIN_SCRIPTS => 1,
|
CHAIN_SCRIPTS => 1,
|
||||||
|
SUBSYSLOCK => 1,
|
||||||
);
|
);
|
||||||
#
|
#
|
||||||
# Variables involved in ?IF, ?ELSE ?ENDIF processing
|
# Variables involved in ?IF, ?ELSE ?ENDIF processing
|
||||||
@ -801,7 +802,6 @@ sub initialize( $;$$) {
|
|||||||
PERL => undef,
|
PERL => undef,
|
||||||
PATH => undef,
|
PATH => undef,
|
||||||
SHOREWALL_SHELL => undef,
|
SHOREWALL_SHELL => undef,
|
||||||
SUBSYSLOCK => undef,
|
|
||||||
MODULESDIR => undef,
|
MODULESDIR => undef,
|
||||||
CONFIG_PATH => undef,
|
CONFIG_PATH => undef,
|
||||||
RESTOREFILE => undef,
|
RESTOREFILE => undef,
|
||||||
@ -6805,7 +6805,7 @@ sub generate_aux_config() {
|
|||||||
|
|
||||||
emit "#\n# Shorewall auxiliary configuration file created by Shorewall version $globals{VERSION} - $date\n#";
|
emit "#\n# Shorewall auxiliary configuration file created by Shorewall version $globals{VERSION} - $date\n#";
|
||||||
|
|
||||||
for my $option ( qw(VERBOSITY LOGFILE LOGFORMAT ARPTABLES IPTABLES IP6TABLES IP TC IPSET PATH SHOREWALL_SHELL SUBSYSLOCK LOCKFILE RESTOREFILE WORKAROUNDS RESTART DYNAMIC_BLACKLIST) ) {
|
for my $option ( qw(VERBOSITY LOGFILE LOGFORMAT ARPTABLES IPTABLES IP6TABLES IP TC IPSET PATH SHOREWALL_SHELL LOCKFILE RESTOREFILE WORKAROUNDS RESTART DYNAMIC_BLACKLIST) ) {
|
||||||
conditionally_add_option $option;
|
conditionally_add_option $option;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -49,7 +49,6 @@ start_command() {
|
|||||||
define_firewall
|
define_firewall
|
||||||
status=$?
|
status=$?
|
||||||
if [ $status -eq 0 ]; then
|
if [ $status -eq 0 ]; then
|
||||||
[ -n "$SUBSYSLOCK" ] && touch $SUBSYSLOCK
|
|
||||||
progress_message3 "done."
|
progress_message3 "done."
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
@ -61,7 +60,6 @@ stop_command() {
|
|||||||
progress_message3 "Stopping $g_product...."
|
progress_message3 "Stopping $g_product...."
|
||||||
detect_configuration
|
detect_configuration
|
||||||
stop_firewall
|
stop_firewall
|
||||||
[ -n "$SUBSYSLOCK" ] && rm -f $SUBSYSLOCK
|
|
||||||
progress_message3 "done."
|
progress_message3 "done."
|
||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
@ -78,9 +76,6 @@ reload_command() {
|
|||||||
detect_configuration
|
detect_configuration
|
||||||
define_firewall
|
define_firewall
|
||||||
status=$?
|
status=$?
|
||||||
if [ -n "$SUBSYSLOCK" ]; then
|
|
||||||
[ $status -eq 0 ] && touch $SUBSYSLOCK || rm -f $SUBSYSLOCK
|
|
||||||
fi
|
|
||||||
|
|
||||||
[ $status -eq 0 ] && progress_message3 "done."
|
[ $status -eq 0 ] && progress_message3 "done."
|
||||||
}
|
}
|
||||||
@ -339,9 +334,6 @@ case "$COMMAND" in
|
|||||||
detect_configuration
|
detect_configuration
|
||||||
define_firewall
|
define_firewall
|
||||||
status=$?
|
status=$?
|
||||||
if [ -n "$SUBSYSLOCK" ]; then
|
|
||||||
[ $status -eq 0 ] && touch $SUBSYSLOCK || rm -f $SUBSYSLOCK
|
|
||||||
fi
|
|
||||||
[ $status -eq 0 ] && progress_message3 "done."
|
[ $status -eq 0 ] && progress_message3 "done."
|
||||||
;;
|
;;
|
||||||
clear)
|
clear)
|
||||||
@ -349,9 +341,6 @@ case "$COMMAND" in
|
|||||||
progress_message3 "Clearing $g_product...."
|
progress_message3 "Clearing $g_product...."
|
||||||
clear_firewall
|
clear_firewall
|
||||||
status=0
|
status=0
|
||||||
if [ -n "$SUBSYSLOCK" ]; then
|
|
||||||
rm -f $SUBSYSLOCK
|
|
||||||
fi
|
|
||||||
progress_message3 "done."
|
progress_message3 "done."
|
||||||
;;
|
;;
|
||||||
status)
|
status)
|
||||||
|
@ -99,8 +99,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -110,8 +110,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -107,8 +107,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -110,8 +110,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -99,8 +99,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=/var/lock/subsys/shorewall
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -540,9 +540,6 @@ if [ ! -f ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf ]; then
|
|||||||
sed -e 's!LOGFILE=/var/log/messages!LOGFILE=/var/log/messages.log!' -i ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
sed -e 's!LOGFILE=/var/log/messages!LOGFILE=/var/log/messages.log!' -i ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
||||||
elif [ $HOST = debian ]; then
|
elif [ $HOST = debian ]; then
|
||||||
perl -p -w -i -e 's|^STARTUP_ENABLED=.*|STARTUP_ENABLED=Yes|;' ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf${suffix}
|
perl -p -w -i -e 's|^STARTUP_ENABLED=.*|STARTUP_ENABLED=Yes|;' ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf${suffix}
|
||||||
elif [ $HOST = gentoo ]; then
|
|
||||||
# Adjust SUBSYSLOCK path (see https://bugs.gentoo.org/show_bug.cgi?id=459316)
|
|
||||||
perl -p -w -i -e "s|^SUBSYSLOCK=.*|SUBSYSLOCK=/run/lock/$PRODUCT|;" ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf${suffix}
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
echo "Config file installed as ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf"
|
echo "Config file installed as ${DESTDIR}${CONFDIR}/$PRODUCT/$PRODUCT.conf"
|
||||||
@ -1222,7 +1219,7 @@ if [ $configure -eq 1 -a -z "$DESTDIR" -a -n "$first_install" -a -z "${cygwin}${
|
|||||||
if [ $HOST = debian ]; then
|
if [ $HOST = debian ]; then
|
||||||
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
||||||
touch /var/log/$PRODUCT-init.log
|
touch /var/log/$PRODUCT-init.log
|
||||||
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;s/^SUBSYSLOCK=.*/SUBSYSLOCK=/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
||||||
else
|
else
|
||||||
echo "Set STARTUP_ENABLED=Yes in ${CONFDIR}/$PRODUCT/$PRODUCT.conf to enable"
|
echo "Set STARTUP_ENABLED=Yes in ${CONFDIR}/$PRODUCT/$PRODUCT.conf to enable"
|
||||||
fi
|
fi
|
||||||
@ -1241,7 +1238,7 @@ if [ $configure -eq 1 -a -z "$DESTDIR" -a -n "$first_install" -a -z "${cygwin}${
|
|||||||
echo "$PRODUCT will start automatically at boot"
|
echo "$PRODUCT will start automatically at boot"
|
||||||
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
||||||
touch /var/log/$PRODUCT-init.log
|
touch /var/log/$PRODUCT-init.log
|
||||||
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;s/^SUBSYSLOCK=.*/SUBSYSLOCK=/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
||||||
update-rc.d $PRODUCT enable
|
update-rc.d $PRODUCT enable
|
||||||
elif mywhich rc-update ; then
|
elif mywhich rc-update ; then
|
||||||
if rc-update add $PRODUCT default; then
|
if rc-update add $PRODUCT default; then
|
||||||
@ -1249,7 +1246,7 @@ if [ $configure -eq 1 -a -z "$DESTDIR" -a -n "$first_install" -a -z "${cygwin}${
|
|||||||
if [ $HOST = debian ]; then
|
if [ $HOST = debian ]; then
|
||||||
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
echo "Set startup=1 in ${CONFDIR}/default/$PRODUCT to enable"
|
||||||
touch /var/log/$PRODUCT-init.log
|
touch /var/log/$PRODUCT-init.log
|
||||||
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;s/^SUBSYSLOCK=.*/SUBSYSLOCK=/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
perl -p -w -i -e 's/^STARTUP_ENABLED=No/STARTUP_ENABLED=Yes/;s/^IP_FORWARDING=On/IP_FORWARDING=Keep/;' ${CONFDIR}/$PRODUCT/$PRODUCT.conf
|
||||||
else
|
else
|
||||||
echo "Set STARTUP_ENABLED=Yes in ${CONFDIR}/$PRODUCT/$PRODUCT.conf to enable"
|
echo "Set STARTUP_ENABLED=Yes in ${CONFDIR}/$PRODUCT/$PRODUCT.conf to enable"
|
||||||
fi
|
fi
|
||||||
|
@ -2562,20 +2562,6 @@ INLINE - - - ;; -j REJECT
|
|||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term><emphasis
|
|
||||||
role="bold">SUBSYSLOCK=</emphasis>[<emphasis>pathname</emphasis>]</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>This parameter should be set to the name of a file that the
|
|
||||||
firewall should create if it starts successfully and remove when it
|
|
||||||
stops. Creating and removing this file allows Shorewall to work with
|
|
||||||
your distribution's initscripts. For RedHat and OpenSuSE, this
|
|
||||||
should be set to /var/lock/subsys/shorewall. For Debian, the value
|
|
||||||
is /var/lock/shorewall and in LEAF it is /var/run/shorewall.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><emphasis
|
<term><emphasis
|
||||||
role="bold">TC</emphasis>=[<emphasis>pathname</emphasis>]</term>
|
role="bold">TC</emphasis>=[<emphasis>pathname</emphasis>]</term>
|
||||||
|
@ -133,20 +133,6 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term><emphasis
|
|
||||||
role="bold">SUBSYSLOCK=</emphasis>[<emphasis>pathname</emphasis>]</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>This parameter should be set to the name of a file that the
|
|
||||||
firewall should create if it starts successfully and remove when it
|
|
||||||
stops. Creating and removing this file allows Shorewall6 to work
|
|
||||||
with your distribution's initscripts. For RedHat, this should be set
|
|
||||||
to /var/lock/subsys/shorewall6. For Debian, the value is
|
|
||||||
/var/state/shorewall6 and in LEAF it is /var/run/shorewall.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><emphasis role="bold">VERBOSITY=</emphasis>[<emphasis
|
<term><emphasis role="bold">VERBOSITY=</emphasis>[<emphasis
|
||||||
role="bold"><emphasis>number</emphasis></emphasis>]</term>
|
role="bold"><emphasis>number</emphasis></emphasis>]</term>
|
||||||
|
@ -40,8 +40,6 @@ PATH=
|
|||||||
|
|
||||||
SHOREWALL_SHELL=
|
SHOREWALL_SHELL=
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
RESTOREFILE=
|
RESTOREFILE=
|
||||||
|
|
||||||
#LAST LINE -- DO NOT REMOVE
|
#LAST LINE -- DO NOT REMOVE
|
||||||
|
@ -96,8 +96,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -97,8 +97,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -96,8 +96,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -96,8 +96,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -96,8 +96,6 @@ RESTOREFILE=restore
|
|||||||
|
|
||||||
SHOREWALL_SHELL=/bin/sh
|
SHOREWALL_SHELL=/bin/sh
|
||||||
|
|
||||||
SUBSYSLOCK=/var/lock/subsys/shorewall6
|
|
||||||
|
|
||||||
TC=
|
TC=
|
||||||
|
|
||||||
###############################################################################
|
###############################################################################
|
||||||
|
@ -2197,20 +2197,6 @@ INLINE - - - ;; -j REJECT
|
|||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
|
||||||
<term><emphasis
|
|
||||||
role="bold">SUBSYSLOCK=</emphasis>[<emphasis>pathname</emphasis>]</term>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>This parameter should be set to the name of a file that the
|
|
||||||
firewall should create if it starts successfully and remove when it
|
|
||||||
stops. Creating and removing this file allows Shorewall6 to work
|
|
||||||
with your distribution's initscripts. For RedHat, this should be set
|
|
||||||
to /var/lock/subsys/shorewall6. For Debian, the value is
|
|
||||||
/var/lock/shorewall6 and in LEAF it is /var/run/shorewall.</para>
|
|
||||||
</listitem>
|
|
||||||
</varlistentry>
|
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><emphasis
|
<term><emphasis
|
||||||
role="bold">TC</emphasis>=[<emphasis>pathname</emphasis>]</term>
|
role="bold">TC</emphasis>=[<emphasis>pathname</emphasis>]</term>
|
||||||
|
Loading…
Reference in New Issue
Block a user