2015-06-08 21:10:21 +02:00
|
|
|
#!/bin/bash
|
|
|
|
# The Shoreline Firewall (Shorewall) Packet Filtering Firewall - V4.6
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
# (c) 2012-2014 - Tom Eastep (teastep@shorewall.net)
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
# On most distributions, this file should be called
|
|
|
|
# /etc/init.d/shorewall.
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
# Complete documentation is available at http://shorewall.net
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
# This program is part of Shorewall.
|
2014-01-04 18:48:27 +01:00
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or modify
|
2015-06-08 21:10:21 +02:00
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 2 of the license or,
|
|
|
|
# at your option, any later version.
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2014-01-04 18:48:27 +01:00
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2014-01-04 18:48:27 +01:00
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2012-02-29 17:39:27 +01:00
|
|
|
#
|
2015-06-08 21:10:21 +02:00
|
|
|
###############################################################################
|
2013-08-20 22:06:25 +02:00
|
|
|
# set the STATEDIR variable
|
|
|
|
setstatedir() {
|
|
|
|
local statedir
|
|
|
|
if [ -f ${CONFDIR}/${PRODUCT}/vardir ]; then
|
|
|
|
statedir=$( . /${CONFDIR}/${PRODUCT}/vardir && echo $VARDIR )
|
|
|
|
fi
|
|
|
|
|
2014-11-24 08:43:32 +01:00
|
|
|
[ -n "$statedir" ] && STATEDIR=${statedir} || STATEDIR=${VARLIB}/${PRODUCT}
|
2013-08-20 22:06:25 +02:00
|
|
|
|
|
|
|
if [ $PRODUCT = shorewall -o $PRODUCT = shorewall6 ]; then
|
2015-06-08 21:15:35 +02:00
|
|
|
${SBINDIR}/$PRODUCT ${OPTIONS} compile -c
|
|
|
|
else
|
|
|
|
return 0
|
2013-08-20 22:06:25 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2012-03-30 21:02:25 +02:00
|
|
|
#
|
|
|
|
# This is modified by the installer when ${SHAREDIR} <> /usr/share
|
|
|
|
#
|
|
|
|
. /usr/share/shorewall/shorewallrc
|
2012-03-25 07:14:01 +02:00
|
|
|
|
2012-02-29 17:39:27 +01:00
|
|
|
# check if shorewall-init is configured or not
|
2012-03-25 07:14:01 +02:00
|
|
|
if [ -f "$SYSCONFDIR/shorewall-init" ]; then
|
|
|
|
. $SYSCONFDIR/shorewall-init
|
2012-03-01 15:41:06 +01:00
|
|
|
if [ -z "$PRODUCTS" ]; then
|
2015-06-08 21:10:21 +02:00
|
|
|
echo "ERROR: No products configured" >&2
|
2012-02-29 17:39:27 +01:00
|
|
|
exit 1
|
2012-03-01 15:41:06 +01:00
|
|
|
fi
|
|
|
|
else
|
2013-09-09 15:50:28 +02:00
|
|
|
echo "ERROR: ${SYSCONFDIR}/shorewall-init not found" >&2
|
2012-03-01 15:41:06 +01:00
|
|
|
exit 1
|
2012-02-29 17:39:27 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
# Initialize the firewall
|
|
|
|
shorewall_start () {
|
2015-06-08 21:10:21 +02:00
|
|
|
local PRODUCT
|
|
|
|
local STATEDIR
|
|
|
|
|
|
|
|
echo -n "Initializing \"Shorewall-based firewalls\": "
|
|
|
|
for PRODUCT in $PRODUCTS; do
|
2015-06-08 21:15:35 +02:00
|
|
|
if setstatedir; then
|
|
|
|
if [ -x ${STATEDIR}/firewall ]; then
|
|
|
|
#
|
|
|
|
# Run in a sub-shell to avoid name collisions
|
|
|
|
#
|
|
|
|
(
|
|
|
|
if ! ${STATEDIR}/firewall status > /dev/null 2>&1; then
|
|
|
|
${STATEDIR}/firewall ${OPTIONS} stop
|
|
|
|
fi
|
|
|
|
)
|
|
|
|
fi
|
2015-06-08 21:10:21 +02:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ -n "$SAVE_IPSETS" -a -f "$SAVE_IPSETS" ]; then
|
|
|
|
ipset -R < "$SAVE_IPSETS"
|
|
|
|
fi
|
|
|
|
|
|
|
|
return 0
|
2012-02-29 17:39:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
# Clear the firewall
|
|
|
|
shorewall_stop () {
|
2015-06-08 21:10:21 +02:00
|
|
|
local PRODUCT
|
|
|
|
local STATEDIR
|
|
|
|
|
|
|
|
echo -n "Clearing \"Shorewall-based firewalls\": "
|
|
|
|
for PRODUCT in $PRODUCTS; do
|
2015-06-08 21:15:35 +02:00
|
|
|
if setstatedir; then
|
|
|
|
if [ -x ${STATEDIR}/firewall ]; then
|
|
|
|
${STATEDIR}/firewall ${OPTIONS} clear
|
|
|
|
fi
|
2015-06-08 21:10:21 +02:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ -n "$SAVE_IPSETS" ]; then
|
|
|
|
mkdir -p $(dirname "$SAVE_IPSETS")
|
|
|
|
if ipset -S > "${SAVE_IPSETS}.tmp"; then
|
|
|
|
grep -qE -- '^(-N|create )' "${SAVE_IPSETS}.tmp" && mv -f "${SAVE_IPSETS}.tmp" "$SAVE_IPSETS"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
return 0
|
2012-02-29 17:39:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
case "$1" in
|
2015-06-08 21:10:21 +02:00
|
|
|
start)
|
|
|
|
shorewall_start
|
|
|
|
;;
|
|
|
|
stop)
|
|
|
|
shorewall_stop
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo "Usage: $0 {start|stop}"
|
|
|
|
exit 1
|
2012-02-29 17:39:27 +01:00
|
|
|
esac
|
|
|
|
|
|
|
|
exit 0
|