Fix '\!' in hosts file

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2017 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2005-03-31 23:24:42 +00:00
parent 8933f61524
commit e6e9fccab4
7 changed files with 19 additions and 11 deletions

View File

@ -125,3 +125,5 @@ Changes in 2.0.17
1) Fix rejNotSyn. 1) Fix rejNotSyn.
2) Fix port numbers in action.AllowPCA 2) Fix port numbers in action.AllowPCA
3) Fix "!" in hosts file's HOST column.

View File

@ -28,7 +28,7 @@
# shown below. Simply run this script to revert to your prior version of # shown below. Simply run this script to revert to your prior version of
# Shoreline Firewall. # Shoreline Firewall.
VERSION=2.0.16 VERSION=2.0.17
usage() # $1 = exit status usage() # $1 = exit status
{ {

View File

@ -5323,7 +5323,7 @@ activate_rules()
shift shift
if havenatchain $destchain ; then if havenatchain $destchain ; then
run_iptables -t nat -A $sourcechain $@ -j $destchain run_iptables2 -t nat -A $sourcechain $@ -j $destchain
elif [ -n "$BRIDGING" -a -f $TMP_DIR/physdev ]; then elif [ -n "$BRIDGING" -a -f $TMP_DIR/physdev ]; then
rm -f #TMP_DIR/physdev rm -f #TMP_DIR/physdev
fi fi
@ -5340,7 +5340,7 @@ activate_rules()
shift shift
if havenatchain $destchain; then if havenatchain $destchain; then
eval run_iptables -t nat -I $sourcechain \ eval run_iptables2 -t nat -I $sourcechain \
\$${sourcechain}_rule $@ -j $destchain \$${sourcechain}_rule $@ -j $destchain
eval ${sourcechain}_rule=\$\(\(\$${sourcechain}_rule + 1\)\) eval ${sourcechain}_rule=\$\(\(\$${sourcechain}_rule + 1\)\)
elif [ -n "$BRIDGING" -a -f $TMP_DIR/physdev ]; then elif [ -n "$BRIDGING" -a -f $TMP_DIR/physdev ]; then
@ -5393,7 +5393,7 @@ activate_rules()
interface=${host%%:*} interface=${host%%:*}
networks=${host#*:} networks=${host#*:}
run_iptables -A OUTPUT -o $interface $(match_dest_hosts $networks) -j $chain1 run_iptables2 -A OUTPUT -o $interface $(match_dest_hosts $networks) -j $chain1
# #
# Add jumps from the builtin chains for DNAT and SNAT rules # Add jumps from the builtin chains for DNAT and SNAT rules
@ -5401,10 +5401,10 @@ activate_rules()
addrulejump PREROUTING $(dnat_chain $zone) -i $interface $(match_source_hosts $networks) addrulejump PREROUTING $(dnat_chain $zone) -i $interface $(match_source_hosts $networks)
addrulejump POSTROUTING $(snat_chain $zone) -o $interface $(match_dest_hosts $networks) addrulejump POSTROUTING $(snat_chain $zone) -o $interface $(match_dest_hosts $networks)
run_iptables -A $(input_chain $interface) $(match_source_hosts $networks) -j $chain2 run_iptables2 -A $(input_chain $interface) $(match_source_hosts $networks) -j $chain2
[ -n "$complex" ] && \ [ -n "$complex" ] && \
run_iptables -A $(forward_chain $interface) $(match_source_hosts $networks) -j $frwd_chain run_iptables2 -A $(forward_chain $interface) $(match_source_hosts $networks) -j $frwd_chain
case $networks in case $networks in
*.*.*.*) *.*.*.*)
@ -5469,7 +5469,7 @@ activate_rules()
# routeback was specified for this host group # routeback was specified for this host group
# #
if [ $zone != $zone1 -o $num_ifaces -gt 1 ] || list_search $host1 $routeback ; then if [ $zone != $zone1 -o $num_ifaces -gt 1 ] || list_search $host1 $routeback ; then
run_iptables -A $frwd_chain -o $interface1 $(match_dest_hosts $networks1) -j $chain run_iptables2 -A $frwd_chain -o $interface1 $(match_dest_hosts $networks1) -j $chain
fi fi
done done
else else
@ -5484,7 +5484,7 @@ activate_rules()
networks1=${host1#*:} networks1=${host1#*:}
if [ "$host" != "$host1" ] || list_search $host $routeback; then if [ "$host" != "$host1" ] || list_search $host $routeback; then
run_iptables -A $chain1 $(match_source_hosts $networks) -o $interface1 $(match_dest_hosts $networks1) -j $chain run_iptables2 -A $chain1 $(match_source_hosts $networks) -o $interface1 $(match_dest_hosts $networks1) -j $chain
fi fi
done done
done done

View File

@ -22,7 +22,7 @@
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
# #
VERSION=2.0.16 VERSION=2.0.17
usage() # $1 = exit status usage() # $1 = exit status
{ {

View File

@ -307,3 +307,7 @@ Problems corrected in 2.0.17
2) The UDP and TCP port numbers in /usr/share/shorewall/action.AllowPCA 2) The UDP and TCP port numbers in /usr/share/shorewall/action.AllowPCA
were reversed. were reversed.
3) If a zone is defined in /etc/shorewall/hosts using
<interface>:!<network> in the HOSTS column then startup errors occur
on "shorewall [re]start".

View File

@ -1,5 +1,5 @@
%define name shorewall %define name shorewall
%define version 2.0.16 %define version 2.0.17
%define release 1 %define release 1
%define prefix /usr %define prefix /usr
@ -141,6 +141,8 @@ fi
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel %doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
%changelog %changelog
* Thu Mar 31 2005 Tom Eastep tom@shorewall.net
- Updated to 2.0.17-1
* Tue Feb 01 2005 Tom Eastep tom@shorewall.net * Tue Feb 01 2005 Tom Eastep tom@shorewall.net
- Updated to 2.0.16-1 - Updated to 2.0.16-1
* Wed Jan 12 2005 Tom Eastep tom@shorewall.net * Wed Jan 12 2005 Tom Eastep tom@shorewall.net

View File

@ -26,7 +26,7 @@
# You may only use this script to uninstall the version # You may only use this script to uninstall the version
# shown below. Simply run this script to remove Seattle Firewall # shown below. Simply run this script to remove Seattle Firewall
VERSION=2.0.16 VERSION=2.0.17
usage() # $1 = exit status usage() # $1 = exit status
{ {