mirror of
https://gitlab.com/shorewall/code.git
synced 2025-02-16 09:50:33 +01:00
Cleanup in process_rule1(); cosmetic changes to global variable generation
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@6293 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
e131aef733
commit
6d20c6672d
@ -1716,23 +1716,34 @@ sub emitr( $ ) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
my $emitted_comment = 0;
|
||||||
|
|
||||||
|
sub emit_comment() {
|
||||||
|
unless ( $emitted_comment ) {
|
||||||
|
emitj ( '#',
|
||||||
|
'# Establish the values of shell variables used in the following function calls',
|
||||||
|
'#' );
|
||||||
|
$emitted_comment = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#
|
#
|
||||||
# Generate function that sets global variables
|
# Generate setting of global variables
|
||||||
#
|
#
|
||||||
sub set_global_variables() {
|
sub set_global_variables() {
|
||||||
|
|
||||||
#
|
|
||||||
# Establish the values of shell variables used in the following shell commands and/or 'here documents' input.
|
|
||||||
#
|
|
||||||
for ( values %interfaceaddr ) {
|
for ( values %interfaceaddr ) {
|
||||||
|
emit_comment;
|
||||||
emit $_;
|
emit $_;
|
||||||
}
|
}
|
||||||
|
|
||||||
for ( values %interfaceaddrs ) {
|
for ( values %interfaceaddrs ) {
|
||||||
|
emit_comment;
|
||||||
emit $_;
|
emit $_;
|
||||||
}
|
}
|
||||||
|
|
||||||
for ( values %interfacenets ) {
|
for ( values %interfacenets ) {
|
||||||
|
emit_comment;
|
||||||
emit $_;
|
emit $_;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -970,7 +970,7 @@ sub process_rule1 ( $$$$$$$$$$ ) {
|
|||||||
#
|
#
|
||||||
$rule = join( '', do_proto($proto, $ports, $sports), do_ratelimit( $ratelimit, $basictarget ) , do_user( $user ) , do_test( $mark , 0xFF ) );
|
$rule = join( '', do_proto($proto, $ports, $sports), do_ratelimit( $ratelimit, $basictarget ) , do_user( $user ) , do_test( $mark , 0xFF ) );
|
||||||
|
|
||||||
if ( $section eq 'ESTABLISHED' || $section eq 'RELATED' ) {
|
unless ( $section eq 'NEW' ) {
|
||||||
fatal_error "Entries in the $section SECTION of the rules file not permitted with FASTACCEPT=Yes" if $config{FASTACCEPT};
|
fatal_error "Entries in the $section SECTION of the rules file not permitted with FASTACCEPT=Yes" if $config{FASTACCEPT};
|
||||||
fatal_error "$basictarget rules are not allowed in the $section SECTION" if $actiontype & NONAT;
|
fatal_error "$basictarget rules are not allowed in the $section SECTION" if $actiontype & NONAT;
|
||||||
$rule .= "-m state --state $section "
|
$rule .= "-m state --state $section "
|
||||||
@ -1061,8 +1061,7 @@ sub process_rule1 ( $$$$$$$$$$ ) {
|
|||||||
$dest = $server;
|
$dest = $server;
|
||||||
$action = 'ACCEPT';
|
$action = 'ACCEPT';
|
||||||
}
|
}
|
||||||
} else {
|
} elsif ( $actiontype & NONAT ) {
|
||||||
if ( $actiontype & NONAT ) {
|
|
||||||
#
|
#
|
||||||
# NONAT or ACCEPT+ -- May not specify a destination interface
|
# NONAT or ACCEPT+ -- May not specify a destination interface
|
||||||
#
|
#
|
||||||
@ -1087,7 +1086,6 @@ sub process_rule1 ( $$$$$$$$$$ ) {
|
|||||||
$action ,
|
$action ,
|
||||||
'' );
|
'' );
|
||||||
}
|
}
|
||||||
}
|
|
||||||
#
|
#
|
||||||
# Add filter table rule, unless this is a NATONLY rule type
|
# Add filter table rule, unless this is a NATONLY rule type
|
||||||
#
|
#
|
||||||
|
@ -584,14 +584,11 @@ sub generate_script_3() {
|
|||||||
emit 'define_firewall() {';
|
emit 'define_firewall() {';
|
||||||
push_indent;
|
push_indent;
|
||||||
|
|
||||||
emit '';
|
|
||||||
|
|
||||||
set_global_variables;
|
set_global_variables;
|
||||||
|
|
||||||
emit '';
|
emit '';
|
||||||
|
|
||||||
emit<<'EOF';
|
emit<<'EOF';
|
||||||
|
|
||||||
setup_routing_and_traffic_shaping;
|
setup_routing_and_traffic_shaping;
|
||||||
|
|
||||||
if [ $COMMAND = restore ]; then
|
if [ $COMMAND = restore ]; then
|
||||||
|
Loading…
Reference in New Issue
Block a user