2010-05-17 00:35:22 +02:00
|
|
|
#! /bin/bash
|
2012-04-03 16:52:39 +02:00
|
|
|
# The Shoreline Firewall (Shorewall) Packet Filtering Firewall - V4.5
|
2010-05-17 00:35:22 +02:00
|
|
|
#
|
|
|
|
# This program is under GPL [http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt]
|
|
|
|
#
|
2012-04-03 16:52:39 +02:00
|
|
|
# (c) 2010,2012 - Tom Eastep (teastep@shorewall.net)
|
2010-05-17 00:35:22 +02:00
|
|
|
#
|
|
|
|
# On most distributions, this file should be called /etc/init.d/shorewall.
|
|
|
|
#
|
|
|
|
# Complete documentation is available at http://shorewall.net
|
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or modify
|
|
|
|
# it under the terms of Version 2 of the GNU General Public License
|
|
|
|
# as published by the Free Software Foundation.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, write to the Free Software
|
|
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
|
#
|
|
|
|
# chkconfig: - 09 91
|
|
|
|
#
|
|
|
|
### BEGIN INIT INFO
|
|
|
|
# Provides: shorewall-init
|
2010-05-21 21:46:22 +02:00
|
|
|
# Required-start: $local_fs
|
|
|
|
# Required-stop: $local_fs
|
2010-05-21 21:37:22 +02:00
|
|
|
# Default-Start: 2 3 5
|
2011-06-19 19:10:59 +02:00
|
|
|
# Default-Stop: 6
|
2010-05-17 00:35:22 +02:00
|
|
|
# Short-Description: Initialize the firewall at boot time
|
|
|
|
# Description: Place the firewall in a safe state at boot time
|
|
|
|
# prior to bringing up the network.
|
|
|
|
### END INIT INFO
|
|
|
|
|
|
|
|
if [ "$(id -u)" != "0" ]
|
|
|
|
then
|
|
|
|
echo "You must be root to start, stop or restart \"Shorewall \"."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# check if shorewall-init is configured or not
|
|
|
|
if [ -f "/etc/sysconfig/shorewall-init" ]
|
|
|
|
then
|
|
|
|
. /etc/sysconfig/shorewall-init
|
|
|
|
if [ -z "$PRODUCTS" ]
|
|
|
|
then
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
2012-03-31 01:21:37 +02:00
|
|
|
#
|
|
|
|
# The installer may alter this
|
|
|
|
#
|
|
|
|
. /usr/share/shorewall/shorewallrc
|
2012-03-24 21:05:39 +01:00
|
|
|
|
2012-09-05 16:37:12 +02:00
|
|
|
# Locate the current PRODUCT's statedir
|
|
|
|
setstatedir() {
|
|
|
|
local statedir
|
|
|
|
if [ -f ${CONFDIR}/${PRODUCT}/vardir ]; then
|
|
|
|
statedir=$( . /${CONFDIR}/${PRODUCT}/vardir && echo $VARDIR )
|
|
|
|
fi
|
|
|
|
|
|
|
|
[ -n "$statedir" ] && STATEDIR=${statedir} || STATEDIR=${VARDIR}/${PRODUCT}
|
|
|
|
|
|
|
|
if [ ! -x $STATEDIR/firewall ]; then
|
|
|
|
if [ $PRODUCT = shorewall -o $PRODUCT = shorewall6 ]; then
|
|
|
|
${SBINDIR}/$PRODUCT compile $STATEDIR/firewall
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
2012-09-02 19:23:11 +02:00
|
|
|
|
2010-05-17 00:35:22 +02:00
|
|
|
# Initialize the firewall
|
|
|
|
shorewall_start () {
|
2010-07-23 18:26:47 +02:00
|
|
|
local PRODUCT
|
2012-09-02 22:43:43 +02:00
|
|
|
local STATEDIR
|
2010-05-17 00:35:22 +02:00
|
|
|
|
|
|
|
echo -n "Initializing \"Shorewall-based firewalls\": "
|
2010-07-23 18:26:47 +02:00
|
|
|
for PRODUCT in $PRODUCTS; do
|
2012-09-02 22:43:43 +02:00
|
|
|
setstatedir
|
2012-09-02 19:23:11 +02:00
|
|
|
|
2012-09-02 22:43:43 +02:00
|
|
|
if [ -x ${STATEDIR}/firewall ]; then
|
2012-03-24 21:05:39 +01:00
|
|
|
if ! ${SBIN}/$PRODUCT status > /dev/null 2>&1; then
|
2013-08-20 22:06:25 +02:00
|
|
|
${STATEDIR}/firewall stop || exit 1
|
2010-07-23 18:26:47 +02:00
|
|
|
fi
|
2010-05-17 00:35:22 +02:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2011-06-19 19:10:59 +02:00
|
|
|
if [ -n "$SAVE_IPSETS" -a -f "$SAVE_IPSETS" ]; then
|
|
|
|
ipset -R < "$SAVE_IPSETS"
|
|
|
|
fi
|
|
|
|
|
2010-05-17 00:35:22 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
# Clear the firewall
|
|
|
|
shorewall_stop () {
|
2010-07-23 18:26:47 +02:00
|
|
|
local PRODUCT
|
2013-08-24 18:37:56 +02:00
|
|
|
local STATEDIR
|
2010-05-17 00:35:22 +02:00
|
|
|
|
|
|
|
echo -n "Clearing \"Shorewall-based firewalls\": "
|
2010-07-23 18:26:47 +02:00
|
|
|
for PRODUCT in $PRODUCTS; do
|
2012-09-02 22:43:43 +02:00
|
|
|
setstatedir
|
2012-09-02 19:23:11 +02:00
|
|
|
|
2013-08-24 18:37:56 +02:00
|
|
|
if [ ! -x ${STATEDIR}/firewall ]; then
|
2012-09-02 17:35:42 +02:00
|
|
|
if [ $PRODUCT = shorewall -o $product = shorewall6 ]; then
|
|
|
|
${SBINDIR}/$PRODUCT compile
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2013-08-24 18:37:56 +02:00
|
|
|
if [ -x ${STATEDIR}/firewall ]; then
|
|
|
|
${STATEDIR}/firewall clear || exit 1
|
2010-05-17 00:35:22 +02:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2011-06-19 19:10:59 +02:00
|
|
|
if [ -n "$SAVE_IPSETS" ]; then
|
|
|
|
mkdir -p $(dirname "$SAVE_IPSETS")
|
|
|
|
if ipset -S > "${SAVE_IPSETS}.tmp"; then
|
2011-06-19 23:06:42 +02:00
|
|
|
grep -qE -- '^(-N|create )' "${SAVE_IPSETS}.tmp" && mv -f "${SAVE_IPSETS}.tmp" "$SAVE_IPSETS"
|
2011-06-19 19:10:59 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2010-05-17 00:35:22 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
case "$1" in
|
|
|
|
start)
|
|
|
|
shorewall_start
|
|
|
|
;;
|
|
|
|
stop)
|
|
|
|
shorewall_stop
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo "Usage: /etc/init.d/shorewall-init {start|stop}"
|
|
|
|
exit 1
|
|
|
|
esac
|
|
|
|
|
|
|
|
exit 0
|