mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-15 20:24:09 +01:00
1126 lines
35 KiB
Perl
1126 lines
35 KiB
Perl
#
|
|
# Shorewall 4.4 -- /usr/share/shorewall/Shorewall/Providers.pm
|
|
#
|
|
# This program is under GPL [http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt]
|
|
#
|
|
# (c) 2007,2008,2009,2010 - Tom Eastep (teastep@shorewall.net)
|
|
#
|
|
# Complete documentation is available at http://shorewall.net
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of Version 2 of the GNU General Public License
|
|
# as published by the Free Software Foundation.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MAS 02110-1301 USA.
|
|
#
|
|
# This module deals with the /etc/shorewall/providers,
|
|
# /etc/shorewall/route_rules and /etc/shorewall/routes files.
|
|
#
|
|
package Shorewall::Providers;
|
|
require Exporter;
|
|
use Shorewall::Config qw(:DEFAULT :internal);
|
|
use Shorewall::IPAddrs;
|
|
use Shorewall::Zones;
|
|
use Shorewall::Chains qw(:DEFAULT :internal);
|
|
|
|
use strict;
|
|
|
|
our @ISA = qw(Exporter);
|
|
our @EXPORT = qw( setup_providers @routemarked_interfaces handle_stickiness handle_optional_interfaces );
|
|
our @EXPORT_OK = qw( initialize lookup_provider );
|
|
our $VERSION = '4.4_16';
|
|
|
|
use constant { LOCAL_TABLE => 255,
|
|
MAIN_TABLE => 254,
|
|
DEFAULT_TABLE => 253,
|
|
UNSPEC_TABLE => 0
|
|
};
|
|
|
|
our @routemarked_providers;
|
|
our %routemarked_interfaces;
|
|
our @routemarked_interfaces;
|
|
our %provider_interfaces;
|
|
|
|
our $balancing;
|
|
our $fallback;
|
|
our $first_default_route;
|
|
our $first_fallback_route;
|
|
|
|
our %providers;
|
|
|
|
our @providers;
|
|
|
|
our $family;
|
|
|
|
our $lastmark;
|
|
|
|
use constant { ROUTEMARKED_SHARED => 1, ROUTEMARKED_UNSHARED => 2 };
|
|
|
|
#
|
|
# Rather than initializing globals in an INIT block or during declaration,
|
|
# we initialize them in a function. This is done for two reasons:
|
|
#
|
|
# 1. Proper initialization depends on the address family which isn't
|
|
# known until the compiler has started.
|
|
#
|
|
# 2. The compiler can run multiple times in the same process so it has to be
|
|
# able to re-initialize its dependent modules' state.
|
|
#
|
|
sub initialize( $ ) {
|
|
$family = shift;
|
|
|
|
@routemarked_providers = ();
|
|
%routemarked_interfaces = ();
|
|
@routemarked_interfaces = ();
|
|
%provider_interfaces = ();
|
|
$balancing = 0;
|
|
$fallback = 0;
|
|
$first_default_route = 1;
|
|
$first_fallback_route = 1;
|
|
|
|
%providers = ( local => { number => LOCAL_TABLE , mark => 0 , optional => 0 } ,
|
|
main => { number => MAIN_TABLE , mark => 0 , optional => 0 } ,
|
|
default => { number => DEFAULT_TABLE , mark => 0 , optional => 0 } ,
|
|
unspec => { number => UNSPEC_TABLE , mark => 0 , optional => 0 } );
|
|
@providers = ();
|
|
}
|
|
|
|
#
|
|
# Set up marking for 'tracked' interfaces.
|
|
#
|
|
sub setup_route_marking() {
|
|
my $mask = in_hex( $globals{PROVIDER_MASK} );
|
|
|
|
require_capability( $_ , q(The provider 'track' option) , 's' ) for qw/CONNMARK_MATCH CONNMARK/;
|
|
|
|
add_rule $mangle_table->{$_} , "-m connmark ! --mark 0/$mask -j CONNMARK --restore-mark --mask $mask" for qw/PREROUTING OUTPUT/;
|
|
|
|
my $chainref = new_chain 'mangle', 'routemark';
|
|
my $chainref1 = new_chain 'mangle', 'setsticky';
|
|
my $chainref2 = new_chain 'mangle', 'setsticko';
|
|
|
|
my %marked_interfaces;
|
|
|
|
for my $providerref ( @routemarked_providers ) {
|
|
my $interface = $providerref->{interface};
|
|
my $physical = $providerref->{physical};
|
|
my $mark = $providerref->{mark};
|
|
|
|
unless ( $marked_interfaces{$interface} ) {
|
|
add_jump $mangle_table->{PREROUTING} , $chainref, 0, "-i $physical -m mark --mark 0/$mask ";
|
|
add_jump $mangle_table->{PREROUTING} , $chainref1, 0, "! -i $physical -m mark --mark $mark/$mask ";
|
|
add_jump $mangle_table->{OUTPUT} , $chainref2, 0, "-m mark --mark $mark/$mask ";
|
|
$marked_interfaces{$interface} = 1;
|
|
}
|
|
|
|
if ( $providerref->{shared} ) {
|
|
add_commands( $chainref, qq(if [ -n "$providerref->{mac}" ]; then) ), incr_cmd_level( $chainref ) if $providerref->{optional};
|
|
add_rule $chainref, match_source_dev( $interface ) . "-m mac --mac-source $providerref->{mac} -j MARK --set-mark $providerref->{mark}";
|
|
decr_cmd_level( $chainref ), add_commands( $chainref, "fi\n" ) if $providerref->{optional};
|
|
} else {
|
|
add_rule $chainref, match_source_dev( $interface ) . "-j MARK --set-mark $providerref->{mark}";
|
|
}
|
|
}
|
|
|
|
add_rule $chainref, "-m mark ! --mark 0/$mask -j CONNMARK --save-mark --mask $mask";
|
|
}
|
|
|
|
sub copy_table( $$$ ) {
|
|
my ( $duplicate, $number, $realm ) = @_;
|
|
#
|
|
# Hack to work around problem in iproute
|
|
#
|
|
my $filter = $family == F_IPV6 ? q(sed 's/ via :: / /' | ) : '';
|
|
|
|
if ( $realm ) {
|
|
emit ( "\$IP -$family route show table $duplicate | sed -r 's/ realm [[:alnum:]_]+//' | while read net route; do" )
|
|
} else {
|
|
emit ( "\$IP -$family route show table $duplicate | ${filter}while read net route; do" )
|
|
}
|
|
|
|
emit ( ' case $net in',
|
|
' default|nexthop)',
|
|
' ;;',
|
|
' *)',
|
|
" run_ip route add table $number \$net \$route $realm",
|
|
' ;;',
|
|
' esac',
|
|
"done\n"
|
|
);
|
|
}
|
|
|
|
sub copy_and_edit_table( $$$$ ) {
|
|
my ( $duplicate, $number, $copy, $realm) = @_;
|
|
#
|
|
# Hack to work around problem in iproute
|
|
#
|
|
my $filter = $family == F_IPV6 ? q(sed 's/ via :: / /' | ) : '';
|
|
#
|
|
# Map physical names in $copy to logical names
|
|
#
|
|
$copy = join( '|' , map( physical_name($_) , split( ',' , $copy ) ) );
|
|
#
|
|
# Shell and iptables use a different wildcard character
|
|
#
|
|
$copy =~ s/\+/*/;
|
|
|
|
if ( $realm ) {
|
|
emit ( "\$IP -$family route show table $duplicate | sed -r 's/ realm [[:alnum:]]+//' | while read net route; do" )
|
|
} else {
|
|
emit ( "\$IP -$family route show table $duplicate | ${filter}while read net route; do" )
|
|
}
|
|
|
|
emit ( ' case $net in',
|
|
' default|nexthop)',
|
|
' ;;',
|
|
' *)',
|
|
' case $(find_device $route) in',
|
|
" $copy)",
|
|
" run_ip route add table $number \$net \$route $realm",
|
|
' ;;',
|
|
' esac',
|
|
' ;;',
|
|
' esac',
|
|
"done\n" );
|
|
}
|
|
|
|
sub balance_default_route( $$$$ ) {
|
|
my ( $weight, $gateway, $interface, $realm ) = @_;
|
|
|
|
$balancing = 1;
|
|
|
|
emit '';
|
|
|
|
if ( $first_default_route ) {
|
|
if ( $gateway ) {
|
|
emit "DEFAULT_ROUTE=\"nexthop via $gateway dev $interface weight $weight $realm\"";
|
|
} else {
|
|
emit "DEFAULT_ROUTE=\"nexthop dev $interface weight $weight $realm\"";
|
|
}
|
|
|
|
$first_default_route = 0;
|
|
} else {
|
|
if ( $gateway ) {
|
|
emit "DEFAULT_ROUTE=\"\$DEFAULT_ROUTE nexthop via $gateway dev $interface weight $weight $realm\"";
|
|
} else {
|
|
emit "DEFAULT_ROUTE=\"\$DEFAULT_ROUTE nexthop dev $interface weight $weight $realm\"";
|
|
}
|
|
}
|
|
}
|
|
|
|
sub balance_fallback_route( $$$$ ) {
|
|
my ( $weight, $gateway, $interface, $realm ) = @_;
|
|
|
|
$fallback = 1;
|
|
|
|
emit '';
|
|
|
|
if ( $first_fallback_route ) {
|
|
if ( $gateway ) {
|
|
emit "FALLBACK_ROUTE=\"nexthop via $gateway dev $interface weight $weight $realm\"";
|
|
} else {
|
|
emit "FALLBACK_ROUTE=\"nexthop dev $interface weight $weight $realm\"";
|
|
}
|
|
|
|
$first_fallback_route = 0;
|
|
} else {
|
|
if ( $gateway ) {
|
|
emit "FALLBACK_ROUTE=\"\$FALLBACK_ROUTE nexthop via $gateway dev $interface weight $weight $realm\"";
|
|
} else {
|
|
emit "FALLBACK_ROUTE=\"\$FALLBACK_ROUTE nexthop dev $interface weight $weight $realm\"";
|
|
}
|
|
}
|
|
}
|
|
|
|
sub start_provider( $$$ ) {
|
|
my ($table, $number, $test ) = @_;
|
|
|
|
emit $test;
|
|
push_indent;
|
|
|
|
emit "#\n# Add Provider $table ($number)\n#";
|
|
|
|
emit "qt ip -$family route flush table $number";
|
|
emit "echo \"qt \$IP -$family route flush table $number\" >> \${VARDIR}/undo_routing";
|
|
}
|
|
|
|
sub add_a_provider( ) {
|
|
|
|
my ($table, $number, $mark, $duplicate, $interface, $gateway, $options, $copy ) = split_line 6, 8, 'providers file';
|
|
|
|
fatal_error "Duplicate provider ($table)" if $providers{$table};
|
|
|
|
my $num = numeric_value $number;
|
|
|
|
fatal_error "Invalid Provider number ($number)" unless defined $num;
|
|
|
|
$number = $num;
|
|
|
|
for my $providerref ( values %providers ) {
|
|
fatal_error "Duplicate provider number ($number)" if $providerref->{number} == $number;
|
|
}
|
|
|
|
( $interface, my $address ) = split /:/, $interface;
|
|
|
|
my $shared = 0;
|
|
|
|
if ( defined $address ) {
|
|
validate_address $address, 0;
|
|
$shared = 1;
|
|
require_capability 'REALM_MATCH', "Configuring multiple providers through one interface", "s";
|
|
}
|
|
|
|
fatal_error "Unknown Interface ($interface)" unless known_interface( $interface );
|
|
fatal_error "A bridge port ($interface) may not be configured as a provider interface" if port_to_bridge $interface;
|
|
|
|
my $physical = get_physical $interface;
|
|
my $base = uc chain_base $physical;
|
|
my $gatewaycase = '';
|
|
|
|
if ( $gateway eq 'detect' ) {
|
|
fatal_error "Configuring multiple providers through one interface requires an explicit gateway" if $shared;
|
|
$gateway = get_interface_gateway $interface;
|
|
$gatewaycase = 'detect';
|
|
} elsif ( $gateway && $gateway ne '-' ) {
|
|
validate_address $gateway, 0;
|
|
$gatewaycase = 'specified';
|
|
} else {
|
|
$gatewaycase = 'none';
|
|
fatal_error "Configuring multiple providers through one interface requires a gateway" if $shared;
|
|
$gateway = '';
|
|
}
|
|
|
|
my ( $loose, $track, $balance , $default, $default_balance, $optional, $mtu, $local ) =
|
|
(0, $config{TRACK_PROVIDERS}, 0 , 0, $config{USE_DEFAULT_RT} ? 1 : 0, interface_is_optional( $interface ), '' , 0 );
|
|
|
|
unless ( $options eq '-' ) {
|
|
for my $option ( split_list $options, 'option' ) {
|
|
if ( $option eq 'track' ) {
|
|
$track = 1;
|
|
} elsif ( $option eq 'notrack' ) {
|
|
$track = 0;
|
|
} elsif ( $option =~ /^balance=(\d+)$/ ) {
|
|
fatal_error q('balance' is not available in IPv6) if $family == F_IPV6;
|
|
$balance = $1;
|
|
} elsif ( $option eq 'balance' ) {
|
|
fatal_error q('balance' is not available in IPv6) if $family == F_IPV6;
|
|
$balance = 1;
|
|
} elsif ( $option eq 'loose' ) {
|
|
$loose = 1;
|
|
$default_balance = 0;
|
|
} elsif ( $option eq 'optional' ) {
|
|
warning_message q(The 'optional' provider option is deprecated - use the 'optional' interface option instead);
|
|
set_interface_option $interface, 'optional', 1;
|
|
$optional = 1;
|
|
} elsif ( $option =~ /^src=(.*)$/ ) {
|
|
fatal_error "OPTION 'src' not allowed on shared interface" if $shared;
|
|
$address = validate_address( $1 , 1 );
|
|
} elsif ( $option =~ /^mtu=(\d+)$/ ) {
|
|
$mtu = "mtu $1 ";
|
|
} elsif ( $option =~ /^fallback=(\d+)$/ ) {
|
|
fatal_error q('fallback' is not available in IPv6) if $family == F_IPV6;
|
|
if ( $config{USE_DEFAULT_RT} ) {
|
|
warning_message "'fallback' is ignored when USE_DEFAULT_RT=Yes";
|
|
} else {
|
|
$default = $1;
|
|
fatal_error 'fallback must be non-zero' unless $default;
|
|
}
|
|
} elsif ( $option eq 'fallback' ) {
|
|
fatal_error q('fallback' is not available in IPv6) if $family == F_IPV6;
|
|
if ( $config{USE_DEFAULT_RT} ) {
|
|
warning_message "'fallback' is ignored when USE_DEFAULT_RT=Yes";
|
|
} else {
|
|
$default = -1;
|
|
}
|
|
} elsif ( $option eq 'local' ) {
|
|
$local = 1;
|
|
$track = 0 if $config{TRACK_PROVIDERS};
|
|
$default_balance = 0 if$config{USE_DEFAULT_RT};
|
|
} else {
|
|
fatal_error "Invalid option ($option)";
|
|
}
|
|
}
|
|
}
|
|
|
|
my $val = 0;
|
|
my $pref;
|
|
|
|
$mark = ( $lastmark += ( 1 << $config{PROVIDER_OFFSET} ) ) if $mark eq '-' && $track;
|
|
|
|
if ( $mark ne '-' ) {
|
|
|
|
$val = numeric_value $mark;
|
|
|
|
fatal_error "Invalid Mark Value ($mark)" unless defined $val && $val;
|
|
|
|
verify_mark $mark;
|
|
|
|
fatal_error "Invalid Mark Value ($mark)" unless ( $val & $globals{PROVIDER_MASK} ) == $val;
|
|
|
|
fatal_error "Provider MARK may not be specified when PROVIDER_BITS=0" unless $config{PROVIDER_BITS};
|
|
|
|
for my $providerref ( values %providers ) {
|
|
fatal_error "Duplicate mark value ($mark)" if numeric_value( $providerref->{mark} ) == $val;
|
|
}
|
|
|
|
$pref = 10000 + $number - 1;
|
|
|
|
$lastmark = $val;
|
|
|
|
}
|
|
|
|
unless ( $loose ) {
|
|
warning_message q(The 'proxyarp' option is dangerous when specified on a Provider interface) if get_interface_option( $interface, 'proxyarp' );
|
|
warning_message q(The 'proxyndp' option is dangerous when specified on a Provider interface) if get_interface_option( $interface, 'proxyndp' );
|
|
}
|
|
|
|
$balance = $default_balance unless $balance;
|
|
|
|
$providers{$table} = { provider => $table,
|
|
number => $number ,
|
|
mark => $val ? in_hex($val) : $val ,
|
|
interface => $interface ,
|
|
physical => $physical ,
|
|
optional => $optional ,
|
|
gateway => $gateway ,
|
|
gatewaycase => $gatewaycase ,
|
|
shared => $shared ,
|
|
default => $default };
|
|
|
|
if ( $track ) {
|
|
fatal_error "The 'track' option requires a numeric value in the MARK column" if $mark eq '-';
|
|
|
|
if ( $routemarked_interfaces{$interface} ) {
|
|
fatal_error "Interface $interface is tracked through an earlier provider" if $routemarked_interfaces{$interface} == ROUTEMARKED_UNSHARED;
|
|
fatal_error "Multiple providers through the same interface must their IP address specified in the INTERFACES" unless $shared;
|
|
} else {
|
|
$routemarked_interfaces{$interface} = $shared ? ROUTEMARKED_SHARED : ROUTEMARKED_UNSHARED;
|
|
push @routemarked_interfaces, $interface;
|
|
}
|
|
|
|
push @routemarked_providers, $providers{$table};
|
|
}
|
|
|
|
my $realm = '';
|
|
|
|
fatal_error "Interface $interface is already associated with non-shared provider $provider_interfaces{$interface}" if $provider_interfaces{$table};
|
|
|
|
if ( $shared ) {
|
|
my $variable = $providers{$table}{mac} = get_interface_mac( $gateway, $interface , $table );
|
|
$realm = "realm $number";
|
|
start_provider( $table, $number, qq(if interface_is_usable $physical && [ -n "$variable" ]; then) );
|
|
} else {
|
|
if ( $optional ) {
|
|
start_provider( $table, $number, qq(if [ -n "\$SW_${base}_IS_USABLE" ]; then) );
|
|
} elsif ( $gatewaycase eq 'detect' ) {
|
|
start_provider( $table, $number, qq(if interface_is_usable $physical && [ -n "$gateway" ]; then) );
|
|
} else {
|
|
start_provider( $table, $number, "if interface_is_usable $physical; then" );
|
|
}
|
|
|
|
$provider_interfaces{$interface} = $table;
|
|
|
|
if ( $gatewaycase eq 'none' ) {
|
|
if ( $local ) {
|
|
emit "run_ip route add local 0.0.0.0/0 dev $physical table $number";
|
|
} else {
|
|
emit "run_ip route add default dev $physical table $number";
|
|
}
|
|
}
|
|
}
|
|
|
|
if ( $mark ne '-' ) {
|
|
my $mask = have_capability 'FWMARK_RT_MASK' ? '/' . in_hex $globals{PROVIDER_MASK} : '';
|
|
|
|
emit ( "qt \$IP -$family rule del fwmark ${mark}${mask}" ) if $config{DELETE_THEN_ADD};
|
|
|
|
emit ( "run_ip rule add fwmark ${mark}${mask} pref $pref table $number",
|
|
"echo \"qt \$IP -$family rule del fwmark ${mark}${mask}\" >> \${VARDIR}/undo_routing"
|
|
);
|
|
}
|
|
|
|
if ( $duplicate ne '-' ) {
|
|
fatal_error "The DUPLICATE column must be empty when USE_DEFAULT_RT=Yes" if $config{USE_DEFAULT_RT};
|
|
if ( $copy eq '-' ) {
|
|
copy_table ( $duplicate, $number, $realm );
|
|
} else {
|
|
if ( $copy eq 'none' ) {
|
|
$copy = $interface;
|
|
} else {
|
|
$copy = "$interface,$copy";
|
|
}
|
|
|
|
copy_and_edit_table( $duplicate, $number ,$copy , $realm);
|
|
}
|
|
} elsif ( $copy ne '-' ) {
|
|
fatal_error "The COPY column must be empty when USE_DEFAULT_RT=Yes" if $config{USE_DEFAULT_RT};
|
|
fatal_error 'A non-empty COPY column requires that a routing table be specified in the DUPLICATE column';
|
|
}
|
|
|
|
if ( $gateway ) {
|
|
$address = get_interface_address $interface unless $address;
|
|
emit "run_ip route replace $gateway src $address dev $physical ${mtu}table $number $realm";
|
|
emit "run_ip route add default via $gateway src $address dev $physical ${mtu}table $number $realm";
|
|
}
|
|
|
|
balance_default_route $balance , $gateway, $physical, $realm if $balance;
|
|
|
|
if ( $default > 0 ) {
|
|
balance_fallback_route $default , $gateway, $physical, $realm;
|
|
} elsif ( $default ) {
|
|
emit '';
|
|
if ( $gateway ) {
|
|
emit qq(run_ip route replace default via $gateway src $address dev $physical table ) . DEFAULT_TABLE . qq( metric $number);
|
|
emit qq(echo "qt \$IP -$family route del default via $gateway table ) . DEFAULT_TABLE . qq(" >> \${VARDIR}/undo_routing);
|
|
} else {
|
|
emit qq(run_ip route add default table ) . DEFAULT_TABLE . qq( dev $physical metric $number);
|
|
emit qq(echo "qt \$IP -$family route del default dev $physical table ) . DEFAULT_TABLE . qq(" >> \${VARDIR}/undo_routing);
|
|
}
|
|
}
|
|
|
|
if ( $local ) {
|
|
fatal_error "GATEWAY not valid with 'local' provider" unless $gatewaycase eq 'none';
|
|
fatal_error "'track' not valid with 'local'" if $track;
|
|
fatal_error "DUPLICATE not valid with 'local'" if $duplicate ne '-';
|
|
fatal_error "MARK required with 'local'" unless $mark;
|
|
} elsif ( $loose ) {
|
|
if ( $config{DELETE_THEN_ADD} ) {
|
|
emit ( "\nfind_interface_addresses $physical | while read address; do",
|
|
" qt \$IP -$family rule del from \$address",
|
|
'done'
|
|
);
|
|
}
|
|
} elsif ( $shared ) {
|
|
emit "qt \$IP -$family rule del from $address" if $config{DELETE_THEN_ADD};
|
|
emit( "run_ip rule add from $address pref 20000 table $number" ,
|
|
"echo \"qt \$IP -$family rule del from $address\" >> \${VARDIR}/undo_routing" );
|
|
} else {
|
|
my $rulebase = 20000 + ( 256 * ( $number - 1 ) );
|
|
|
|
emit "\nrulenum=0\n";
|
|
|
|
emit ( "find_interface_addresses $physical | while read address; do" );
|
|
emit ( " qt \$IP -$family rule del from \$address" ) if $config{DELETE_THEN_ADD};
|
|
emit ( " run_ip rule add from \$address pref \$(( $rulebase + \$rulenum )) table $number",
|
|
" echo \"qt \$IP -$family rule del from \$address\" >> \${VARDIR}/undo_routing",
|
|
' rulenum=$(($rulenum + 1))',
|
|
'done'
|
|
);
|
|
}
|
|
|
|
emit qq(\nprogress_message " Provider $table ($number) Added"\n);
|
|
|
|
pop_indent;
|
|
emit 'else';
|
|
|
|
if ( $optional ) {
|
|
if ( $shared ) {
|
|
emit ( " error_message \"WARNING: Gateway $gateway is not reachable -- Provider $table ($number) not Added\"" );
|
|
} else {
|
|
emit ( " error_message \"WARNING: Interface $physical is not usable -- Provider $table ($number) not Added\"" );
|
|
}
|
|
} else {
|
|
if ( $shared ) {
|
|
emit( " fatal_error \"Gateway $gateway is not reachable -- Provider $table ($number) Cannot be Added\"" );
|
|
} else {
|
|
emit( " fatal_error \"Interface $physical is not usable -- Provider $table ($number) Cannot be Added\"" );
|
|
}
|
|
}
|
|
|
|
emit "fi\n";
|
|
|
|
push @providers, $table;
|
|
|
|
progress_message " Provider \"$currentline\" $done";
|
|
}
|
|
|
|
#
|
|
# Begin an 'if' statement testing whether the passed interface is available
|
|
#
|
|
sub start_new_if( $ ) {
|
|
our $current_if = shift;
|
|
|
|
emit ( '', qq(if [ -n "\$SW_${current_if}_IS_USABLE" ]; then) );
|
|
push_indent;
|
|
}
|
|
|
|
#
|
|
# Complete any current 'if' statement in the output script
|
|
#
|
|
sub finish_current_if() {
|
|
if ( our $current_if ) {
|
|
pop_indent;
|
|
emit ( "fi\n" );
|
|
$current_if = '';
|
|
}
|
|
}
|
|
|
|
sub add_an_rtrule( ) {
|
|
my ( $source, $dest, $provider, $priority ) = split_line 4, 4, 'route_rules file';
|
|
|
|
our $current_if;
|
|
|
|
unless ( $providers{$provider} ) {
|
|
my $found = 0;
|
|
|
|
if ( "\L$provider" =~ /^(0x[a-f0-9]+|0[0-7]*|[0-9]*)$/ ) {
|
|
my $provider_number = numeric_value $provider;
|
|
|
|
for ( keys %providers ) {
|
|
if ( $providers{$_}{number} == $provider_number ) {
|
|
$provider = $_;
|
|
$found = 1;
|
|
last;
|
|
}
|
|
}
|
|
}
|
|
|
|
fatal_error "Unknown provider ($provider)" unless $found;
|
|
}
|
|
|
|
fatal_error "You must specify either the source or destination in a route_rules entry" if $source eq '-' && $dest eq '-';
|
|
|
|
if ( $dest eq '-' ) {
|
|
$dest = 'to ' . ALLIP;
|
|
} else {
|
|
validate_net( $dest, 0 );
|
|
$dest = "to $dest";
|
|
}
|
|
|
|
if ( $source eq '-' ) {
|
|
$source = 'from ' . ALLIP;
|
|
} elsif ( $family == F_IPV4 ) {
|
|
if ( $source =~ /:/ ) {
|
|
( my $interface, $source , my $remainder ) = split( /:/, $source, 3 );
|
|
fatal_error "Invalid SOURCE" if defined $remainder;
|
|
validate_net ( $source, 0 );
|
|
$interface = physical_name $interface;
|
|
$source = "iif $interface from $source";
|
|
} elsif ( $source =~ /\..*\..*/ ) {
|
|
validate_net ( $source, 0 );
|
|
$source = "from $source";
|
|
} else {
|
|
$source = "iif $source";
|
|
}
|
|
} elsif ( $source =~ /^(.+?):<(.+)>\s*$/ || $source =~ /^(.+?):\[(.+)\]\s*$/ ) {
|
|
my ($interface, $source ) = ($1, $2);
|
|
validate_net ($source, 0);
|
|
$interface = physical_name $interface;
|
|
$source = "iif $interface from $source";
|
|
} elsif ( $source =~ /:.*:/ || $source =~ /\..*\..*/ ) {
|
|
validate_net ( $source, 0 );
|
|
$source = "from $source";
|
|
} else {
|
|
$source = "iif $source";
|
|
}
|
|
|
|
fatal_error "Invalid priority ($priority)" unless $priority && $priority =~ /^\d{1,5}$/;
|
|
|
|
$priority = "priority $priority";
|
|
|
|
finish_current_if, emit ( "qt \$IP -$family rule del $source $dest $priority" ) if $config{DELETE_THEN_ADD};
|
|
|
|
my ( $optional, $number ) = ( $providers{$provider}{optional} , $providers{$provider}{number} );
|
|
|
|
if ( $optional ) {
|
|
my $base = uc chain_base( $providers{$provider}{physical} );
|
|
finish_current_if if $base ne $current_if;
|
|
start_new_if( $base ) unless $current_if;
|
|
} else {
|
|
finish_current_if;
|
|
}
|
|
|
|
emit ( "run_ip rule add $source $dest $priority table $number",
|
|
"echo \"qt \$IP -$family rule del $source $dest $priority\" >> \${VARDIR}/undo_routing" );
|
|
|
|
progress_message " Routing rule \"$currentline\" $done";
|
|
}
|
|
|
|
sub add_a_route( ) {
|
|
my ( $provider, $dest, $gateway, $device ) = split_line 2, 4, 'routes file';
|
|
|
|
our $current_if;
|
|
|
|
unless ( $providers{$provider} ) {
|
|
my $found = 0;
|
|
|
|
if ( "\L$provider" =~ /^(0x[a-f0-9]+|0[0-7]*|[0-9]*)$/ ) {
|
|
my $provider_number = numeric_value $provider;
|
|
|
|
for ( keys %providers ) {
|
|
if ( $providers{$_}{number} == $provider_number ) {
|
|
$provider = $_;
|
|
fatal_error "You may not add routes to the $provider table" if $provider_number == LOCAL_TABLE || $provider_number == UNSPEC_TABLE;
|
|
$found = 1;
|
|
last;
|
|
}
|
|
}
|
|
}
|
|
|
|
fatal_error "Unknown provider ($provider)" unless $found;
|
|
}
|
|
|
|
validate_net ( $dest, 1 );
|
|
|
|
validate_address ( $gateway, 1 ) if $gateway ne '-';
|
|
|
|
my ( $optional, $number ) = ( $providers{$provider}{optional} , $providers{$provider}{number} );
|
|
|
|
my $physical = $device eq '-' ? $providers{$provider}{physical} : physical_name( $device );
|
|
|
|
if ( $providers{$provider}{optional} ) {
|
|
my $base = uc chain_base( $physical );
|
|
finish_current_if if $base ne $current_if;
|
|
start_new_if ( $base ) unless $current_if;
|
|
} else {
|
|
finish_current_if;
|
|
}
|
|
|
|
if ( $gateway ne '-' ) {
|
|
if ( $device ne '-' ) {
|
|
emit qq(run_ip route add $dest via $gateway dev $physical table $number);
|
|
emit qq(echo "qt \$IP -$family route del $dest via $gateway dev $physical table $number" >> \${VARDIR}/undo_routing) if $number >= DEFAULT_TABLE;
|
|
} else {
|
|
emit qq(run_ip route add $dest via $gateway table $number);
|
|
emit qq(echo "\$IP -$family route del $dest via $gateway table $number" >> \${VARDIR}/undo_routing) if $number >= DEFAULT_TABLE;
|
|
}
|
|
} else {
|
|
fatal_error "You must specify a device for this route" unless $physical;
|
|
emit qq(run_ip route add $dest dev $physical table $number);
|
|
emit qq(echo "\$IP -$family route del $dest dev $physical table $number" >> \${VARDIR}/undo_routing) if $number >= DEFAULT_TABLE;
|
|
}
|
|
|
|
progress_message " Route \"$currentline\" $done";
|
|
}
|
|
|
|
sub setup_null_routing() {
|
|
save_progress_message "Null Routing the RFC 1918 subnets";
|
|
for ( rfc1918_networks ) {
|
|
emit( qq(if ! \$IP -4 route ls | grep -q '^$_.* dev '; then),
|
|
qq( run_ip route replace unreachable $_),
|
|
qq( echo "qt \$IP -4 route del unreachable $_" >> \${VARDIR}/undo_routing),
|
|
qq(fi\n) );
|
|
}
|
|
}
|
|
|
|
sub start_providers() {
|
|
require_capability( 'MANGLE_ENABLED' , 'a non-empty providers file' , 's' );
|
|
|
|
emit ( '#',
|
|
'# Undo any changes made since the last time that we [re]started -- this will not restore the default route',
|
|
'#',
|
|
'undo_routing' );
|
|
|
|
unless ( $config{KEEP_RT_TABLES} ) {
|
|
emit (
|
|
'#',
|
|
'# Save current routing table database so that it can be restored later',
|
|
'#',
|
|
'cp /etc/iproute2/rt_tables ${VARDIR}/' );
|
|
|
|
}
|
|
|
|
emit ( '#',
|
|
'# Capture the default route(s) if we don\'t have it (them) already.',
|
|
'#',
|
|
'[ -f ${VARDIR}/default_route ] || $IP -' . $family . ' route list | grep -E \'^\s*(default |nexthop )\' > ${VARDIR}/default_route',
|
|
'#',
|
|
'# Initialize the file that holds \'undo\' commands',
|
|
'#',
|
|
'> ${VARDIR}/undo_routing' );
|
|
|
|
save_progress_message 'Adding Providers...';
|
|
|
|
emit 'DEFAULT_ROUTE=';
|
|
emit 'FALLBACK_ROUTE=';
|
|
emit '';
|
|
}
|
|
|
|
sub finish_providers() {
|
|
if ( $balancing ) {
|
|
my $table = MAIN_TABLE;
|
|
|
|
if ( $config{USE_DEFAULT_RT} ) {
|
|
emit ( 'run_ip rule add from ' . ALLIP . ' table ' . MAIN_TABLE . ' pref 999',
|
|
"\$IP -$family rule del from " . ALLIP . ' table ' . MAIN_TABLE . ' pref 32766',
|
|
qq(echo "qt \$IP -$family rule add from ) . ALLIP . ' table ' . MAIN_TABLE . ' pref 32766" >> ${VARDIR}/undo_routing',
|
|
qq(echo "qt \$IP -$family rule del from ) . ALLIP . ' table ' . MAIN_TABLE . ' pref 999" >> ${VARDIR}/undo_routing',
|
|
'' );
|
|
$table = DEFAULT_TABLE;
|
|
}
|
|
|
|
emit ( 'if [ -n "$DEFAULT_ROUTE" ]; then' );
|
|
emit ( " run_ip route replace default scope global table $table \$DEFAULT_ROUTE" );
|
|
emit ( " qt \$IP -$family route del default table " . MAIN_TABLE ) if $config{USE_DEFAULT_RT};
|
|
emit ( " progress_message \"Default route '\$(echo \$DEFAULT_ROUTE | sed 's/\$\\s*//')' Added\"",
|
|
'else',
|
|
' error_message "WARNING: No Default route added (all \'balance\' providers are down)"' );
|
|
|
|
if ( $config{RESTORE_DEFAULT_ROUTE} ) {
|
|
emit ' restore_default_route && error_message "NOTICE: Default route restored"'
|
|
} else {
|
|
emit qq( qt \$IP -$family route del default table $table && error_message "WARNING: Default route deleted from table $table");
|
|
}
|
|
|
|
emit( 'fi',
|
|
'' );
|
|
} else {
|
|
emit ( '#',
|
|
'# We don\'t have any \'balance\' providers so we restore any default route that we\'ve saved',
|
|
'#',
|
|
'restore_default_route' ,
|
|
'' );
|
|
}
|
|
|
|
if ( $fallback ) {
|
|
emit ( 'if [ -n "$FALLBACK_ROUTE" ]; then' ,
|
|
" run_ip route replace default scope global table " . DEFAULT_TABLE . " \$FALLBACK_ROUTE" ,
|
|
" progress_message \"Fallback route '\$(echo \$FALLBACK_ROUTE | sed 's/\$\\s*//')' Added\"",
|
|
'fi',
|
|
'' );
|
|
}
|
|
|
|
unless ( $config{KEEP_RT_TABLES} ) {
|
|
emit( 'if [ -w /etc/iproute2/rt_tables ]; then',
|
|
' cat > /etc/iproute2/rt_tables <<EOF' );
|
|
|
|
emit_unindented join( "\n",
|
|
'#',
|
|
'# reserved values',
|
|
'#',
|
|
LOCAL_TABLE . "\tlocal",
|
|
MAIN_TABLE . "\tmain",
|
|
DEFAULT_TABLE . "\tdefault",
|
|
"0\tunspec",
|
|
'#',
|
|
'# local',
|
|
'#' );
|
|
emit_unindented "$providers{$_}{number}\t$_" for @providers;
|
|
emit_unindented "EOF\n";
|
|
|
|
emit "fi\n";
|
|
}
|
|
}
|
|
|
|
sub setup_providers() {
|
|
my $providers = 0;
|
|
|
|
$lastmark = 0;
|
|
|
|
if ( my $fn = open_file 'providers' ) {
|
|
|
|
first_entry sub() {
|
|
progress_message2 "$doing $fn...";
|
|
emit "\nif [ -z \"\$g_noroutes\" ]; then";
|
|
push_indent;
|
|
start_providers; };
|
|
|
|
add_a_provider, $providers++ while read_a_line;
|
|
}
|
|
|
|
if ( $providers ) {
|
|
finish_providers;
|
|
|
|
my $fn = open_file 'routes';
|
|
|
|
if ( $fn ) {
|
|
our $current_if = '';
|
|
|
|
first_entry "$doing $fn...";
|
|
|
|
emit '';
|
|
|
|
add_a_route while read_a_line;
|
|
|
|
finish_current_if;
|
|
}
|
|
|
|
$fn = open_file 'route_rules';
|
|
|
|
if ( $fn ) {
|
|
our $current_if = '';
|
|
|
|
first_entry "$doing $fn...";
|
|
|
|
emit '';
|
|
|
|
add_an_rtrule while read_a_line;
|
|
|
|
finish_current_if;
|
|
}
|
|
|
|
setup_null_routing if $config{NULL_ROUTE_RFC1918};
|
|
emit "\nrun_ip route flush cache";
|
|
#
|
|
# This completes the if-block begun in the first_entry closure above
|
|
#
|
|
pop_indent;
|
|
emit "fi\n";
|
|
|
|
setup_route_marking if @routemarked_interfaces;
|
|
} else {
|
|
emit "\nif [ -z \"\$g_noroutes\" ]; then";
|
|
|
|
push_indent;
|
|
|
|
emit "\nundo_routing";
|
|
emit 'restore_default_route';
|
|
|
|
if ( $config{NULL_ROUTE_RFC1918} ) {
|
|
emit ( '#',
|
|
'# Initialize the file that holds \'undo\' commands',
|
|
'#',
|
|
'> ${VARDIR}/undo_routing' );
|
|
setup_null_routing;
|
|
emit "\nrun_ip route flush cache";
|
|
}
|
|
|
|
pop_indent;
|
|
|
|
emit "fi\n";
|
|
}
|
|
|
|
}
|
|
|
|
sub lookup_provider( $ ) {
|
|
my $provider = $_[0];
|
|
my $providerref = $providers{ $provider };
|
|
|
|
unless ( $providerref ) {
|
|
fatal_error "Unknown provider ($provider)" unless $provider =~ /^(0x[a-f0-9]+|0[0-7]*|[0-9]*)$/;
|
|
|
|
my $provider_number = numeric_value $provider;
|
|
|
|
for ( values %providers ) {
|
|
$providerref = $_, last if $_->{number} == $provider_number;
|
|
}
|
|
|
|
fatal_error "Unknown provider ($provider)" unless $providerref;
|
|
}
|
|
|
|
$providerref->{shared} ? $providerref->{number} : 0;
|
|
}
|
|
|
|
#
|
|
# This function is called by the compiler when it is generating the detect_configuration() function.
|
|
# The function calls Shorewall::Zones::verify_required_interfaces then emits code to set the
|
|
# ..._IS_USABLE interface variables appropriately for the optional interfaces
|
|
#
|
|
# Returns true if there were required or optional interfaces
|
|
#
|
|
sub handle_optional_interfaces( $ ) {
|
|
|
|
my ( $interfaces, $wildcards ) = find_interfaces_by_option1 'optional';
|
|
|
|
if ( @$interfaces ) {
|
|
my $require = $config{REQUIRE_INTERFACE};
|
|
|
|
verify_required_interfaces( shift );
|
|
|
|
emit( 'HAVE_INTERFACE=', '' ) if $require;
|
|
#
|
|
# Clear the '_IS_USABLE' variables
|
|
#
|
|
emit( join( '_', 'SW', uc chain_base( get_physical( $_ ) ) , 'IS_USABLE=' ) ) for @$interfaces;
|
|
|
|
if ( $wildcards ) {
|
|
#
|
|
# We must consider all interfaces with an address in $family -- generate a list of such addresses.
|
|
#
|
|
emit( '',
|
|
'for interface in $(find_all_interfaces1); do',
|
|
);
|
|
|
|
push_indent;
|
|
emit ( 'case "$interface" in' );
|
|
push_indent;
|
|
} else {
|
|
emit '';
|
|
}
|
|
|
|
for my $interface ( grep $provider_interfaces{$_}, @$interfaces ) {
|
|
my $provider = $provider_interfaces{$interface};
|
|
my $physical = get_physical $interface;
|
|
my $base = uc chain_base( $physical );
|
|
my $providerref = $providers{$provider};
|
|
|
|
emit( "$physical)" ), push_indent if $wildcards;
|
|
|
|
if ( $providerref->{gatewaycase} eq 'detect' ) {
|
|
emit qq(if interface_is_usable $physical && [ -n "$providerref->{gateway}" ]; then);
|
|
} else {
|
|
emit qq(if interface_is_usable $physical; then);
|
|
}
|
|
|
|
emit( ' HAVE_INTERFACE=Yes' ) if $require;
|
|
|
|
emit( " SW_${base}_IS_USABLE=Yes" ,
|
|
'fi' );
|
|
|
|
emit( ';;' ), pop_indent if $wildcards;
|
|
}
|
|
|
|
for my $interface ( grep ! $provider_interfaces{$_}, @$interfaces ) {
|
|
my $physical = get_physical $interface;
|
|
my $base = uc chain_base( $physical );
|
|
my $case = $physical;
|
|
my $wild = $case =~ s/\+$/*/;
|
|
|
|
if ( $wildcards ) {
|
|
emit( "$case)" );
|
|
push_indent;
|
|
|
|
if ( $wild ) {
|
|
emit( qq(if [ -z "\$SW_${base}_IS_USABLE" ]; then) );
|
|
push_indent;
|
|
emit ( 'if interface_is_usable $interface; then' );
|
|
} else {
|
|
emit ( "if interface_is_usable $physical; then" );
|
|
}
|
|
} else {
|
|
emit ( "if interface_is_usable $physical; then" );
|
|
}
|
|
|
|
emit ( ' HAVE_INTERFACE=Yes' ) if $require;
|
|
emit ( " SW_${base}_IS_USABLE=Yes" ,
|
|
'fi' );
|
|
|
|
if ( $wildcards ) {
|
|
pop_indent, emit( 'fi' ) if $wild;
|
|
emit( ';;' );
|
|
pop_indent;
|
|
}
|
|
}
|
|
|
|
if ( $wildcards ) {
|
|
emit( '*)' ,
|
|
' ;;'
|
|
);
|
|
pop_indent;
|
|
emit( 'esac' );
|
|
pop_indent;
|
|
emit('done' );
|
|
}
|
|
|
|
if ( $require ) {
|
|
emit( '',
|
|
'if [ -z "$HAVE_INTERFACE" ]; then' ,
|
|
' case "$COMMAND" in',
|
|
' start|restart|restore|refresh)'
|
|
);
|
|
|
|
if ( $family == F_IPV4 ) {
|
|
emit( ' if shorewall_is_started; then' );
|
|
} else {
|
|
emit( ' if shorewall6_is_started; then' );
|
|
}
|
|
|
|
emit( ' fatal_error "No network interface available"',
|
|
' else',
|
|
' startup_error "No network interface available"',
|
|
' fi',
|
|
' ;;',
|
|
' esac',
|
|
'fi'
|
|
);
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
verify_required_interfaces( shift );
|
|
}
|
|
|
|
#
|
|
# The Tc module has collected the 'sticky' rules in the 'tcpre' and 'tcout' chains. In this function, we apply them
|
|
# to the 'tracked' providers
|
|
#
|
|
sub handle_stickiness( $ ) {
|
|
my $havesticky = shift;
|
|
my $mask = in_hex( $globals{PROVIDER_MASK} );
|
|
my $setstickyref = $mangle_table->{setsticky};
|
|
my $setstickoref = $mangle_table->{setsticko};
|
|
my $tcpreref = $mangle_table->{tcpre};
|
|
my $tcoutref = $mangle_table->{tcout};
|
|
my %marked_interfaces;
|
|
my $sticky = 1;
|
|
|
|
if ( $havesticky ) {
|
|
fatal_error "There are SAME tcrules but no 'track' providers" unless @routemarked_providers;
|
|
|
|
for my $providerref ( @routemarked_providers ) {
|
|
my $interface = $providerref->{physical};
|
|
my $base = uc chain_base $interface;
|
|
my $mark = $providerref->{mark};
|
|
|
|
for ( grep /-j sticky/, @{$tcpreref->{rules}} ) {
|
|
my $stickyref = ensure_mangle_chain 'sticky';
|
|
my ( $rule1, $rule2 );
|
|
my $list = sprintf "sticky%03d" , $sticky++;
|
|
|
|
for my $chainref ( $stickyref, $setstickyref ) {
|
|
if ( $chainref->{name} eq 'sticky' ) {
|
|
$rule1 = $_;
|
|
$rule1 =~ s/-j sticky/-m recent --name $list --update --seconds 300 -j MARK --set-mark $mark/;
|
|
$rule2 = $_;
|
|
$rule2 =~ s/-j sticky/-m mark --mark 0\/$mask -m recent --name $list --remove/;
|
|
} else {
|
|
$rule1 = $_;
|
|
$rule1 =~ s/-j sticky/-m mark --mark $mark\/$mask -m recent --name $list --set/;
|
|
$rule2 = '';
|
|
}
|
|
|
|
assert ( $rule1 =~ s/^-A // );
|
|
add_rule $chainref, $rule1;
|
|
|
|
if ( $rule2 ) {
|
|
assert ( $rule2 =~ s/^-A // );
|
|
add_rule $chainref, $rule2;
|
|
}
|
|
}
|
|
}
|
|
|
|
for ( grep /-j sticko/, @{$tcoutref->{rules}} ) {
|
|
my ( $rule1, $rule2 );
|
|
my $list = sprintf "sticky%03d" , $sticky++;
|
|
my $stickoref = ensure_mangle_chain 'sticko';
|
|
|
|
for my $chainref ( $stickoref, $setstickoref ) {
|
|
if ( $chainref->{name} eq 'sticko' ) {
|
|
$rule1 = $_;
|
|
$rule1 =~ s/-j sticko/-m recent --name $list --rdest --update --seconds 300 -j MARK --set-mark $mark/;
|
|
$rule2 = $_;
|
|
$rule2 =~ s/-j sticko/-m mark --mark 0\/$mask -m recent --name $list --rdest --remove/;
|
|
} else {
|
|
$rule1 = $_;
|
|
$rule1 =~ s/-j sticko/-m mark --mark $mark -m recent --name $list --rdest --set/;
|
|
$rule2 = '';
|
|
}
|
|
|
|
assert( $rule1 =~ s/-A // );
|
|
add_rule $chainref, $rule1;
|
|
|
|
if ( $rule2 ) {
|
|
$rule2 =~ s/-A //;
|
|
add_rule $chainref, $rule2;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if ( @routemarked_providers ) {
|
|
delete_jumps $mangle_table->{PREROUTING}, $setstickyref unless @{$setstickyref->{rules}};
|
|
delete_jumps $mangle_table->{OUTPUT}, $setstickoref unless @{$setstickoref->{rules}};
|
|
}
|
|
}
|
|
|
|
1;
|