Compare commits

...

13 Commits

Author SHA1 Message Date
Tom Eastep
8e761c2111 Remove debugging code from Shorewall-init installer
Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-19 08:16:02 -07:00
Tom Eastep
cc44880467 Load xt_LOG in both helpers files
Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-19 07:44:01 -07:00
Tom Eastep
b5b0785440 Correct IPv4 Helpers file
- Change xt_ULOG to ipt_ULOG

Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-18 08:01:51 -07:00
Tom Eastep
299fd15984 Correct Shorewall6 helpers file
Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-17 08:05:47 -07:00
Tom Eastep
a67debafb3 Revert "Correct last patch"
This reverts commit b528625329.
2014-10-16 07:45:20 -07:00
Tom Eastep
b528625329 Correct last patch
Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-16 07:44:09 -07:00
Tom Eastep
49d1c64c00 ipt_LOG in helpers file
Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-15 18:06:15 -07:00
Tom Eastep
f4e36a9ecf Remove 'optional' from the Universal interfaces file
Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-11 07:34:44 -07:00
Tom Eastep
74c4980c91 Merge branch '4.6.4' of ssh://git.code.sf.net/p/shorewall/code into 4.6.4 2014-10-10 16:00:34 -07:00
Tom Eastep
56afdb6419 Avoid confusing output when 4.6.4 CLI executes a 'save'
- If a down-rev firewall is running, the savesets command produces
  confusing usage output

Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-10 15:57:48 -07:00
Tom Eastep
478e72451a Reinstate IPv6 DropSmurfs
Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-10 09:42:23 -07:00
Tom Eastep
54da615be0 Allow the Shorewall-init installer to create SBINDIR
Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-09 12:43:40 -07:00
Tom Eastep
2d948246c3 Revert "Adjust the .service files"
This reverts commit 77015ebb4d.

Conflicts:

	Shorewall-init/shorewall-init.service

Signed-off-by: Tom Eastep <teastep@shorewall.net>
2014-10-09 07:17:54 -07:00
11 changed files with 31 additions and 14 deletions

View File

@@ -367,6 +367,17 @@ resolve_arptables() {
esac esac
} }
#
# Try to run the 'savesets' command
#
savesets() {
local supported
supported=$(run_it ${VARDIR}/firewall help | fgrep savesets )
[ -n "$supported" ] && run_it ${VARDIR}/firewall savesets ${g_restorepath}-ipsets
}
# #
# Save currently running configuration # Save currently running configuration
# #
@@ -428,7 +439,7 @@ do_save() {
;; ;;
esac esac
if ! run_it ${VARDIR}/firewall savesets ${g_restorepath}-ipsets; then if ! savesets; then
case ${SAVE_IPSETS:=No} in case ${SAVE_IPSETS:=No} in
[Yy]es) [Yy]es)
case ${IPSET:=ipset} in case ${IPSET:=ipset} in

View File

@@ -336,7 +336,7 @@ if [ -n "$SYSTEMD" ]; then
run_install $OWNERSHIP -m 644 $SERVICEFILE ${DESTDIR}${SYSTEMD}/$PRODUCT.service run_install $OWNERSHIP -m 644 $SERVICEFILE ${DESTDIR}${SYSTEMD}/$PRODUCT.service
[ ${SBINDIR} != /sbin ] && eval sed -i \'s\|/sbin/\|${SBINDIR}/\|\' ${DESTDIR}${SYSTEMD}/$PRODUCT.service [ ${SBINDIR} != /sbin ] && eval sed -i \'s\|/sbin/\|${SBINDIR}/\|\' ${DESTDIR}${SYSTEMD}/$PRODUCT.service
echo "Service file $SERVICEFILE installed as ${DESTDIR}${SYSTEMD}/$PRODUCT.service" echo "Service file $SERVICEFILE installed as ${DESTDIR}${SYSTEMD}/$PRODUCT.service"
if [ -n "$DESTDIR" ]; then if [ -n "$DESTDIR" -o $configure -eq 0 ]; then
mkdir -p ${DESTDIR}${SBINDIR} mkdir -p ${DESTDIR}${SBINDIR}
chmod 755 ${DESTDIR}${SBINDIR} chmod 755 ${DESTDIR}${SBINDIR}
fi fi
@@ -368,8 +368,6 @@ chmod 644 ${DESTDIR}${SHAREDIR}/shorewall-init/version
# #
# Remove and create the symbolic link to the init script # Remove and create the symbolic link to the init script
# #
echo CONFDIR is $CONFDIR
if [ -z "$DESTDIR" ]; then if [ -z "$DESTDIR" ]; then
rm -f ${SHAREDIR}/shorewall-init/init rm -f ${SHAREDIR}/shorewall-init/init
ln -s ${INITDIR}/${INITFILE} ${SHAREDIR}/shorewall-init/init ln -s ${INITDIR}/${INITFILE} ${SHAREDIR}/shorewall-init/init

View File

@@ -5,8 +5,7 @@
# #
[Unit] [Unit]
Description=Shorewall IPv4 firewall (bootup security) Description=Shorewall IPv4 firewall (bootup security)
Before=network-pre.target Before=network.target
Wants=network-pre.target
Conflicts=iptables.service firewalld.service Conflicts=iptables.service firewalld.service
[Service] [Service]

View File

@@ -5,7 +5,7 @@
# #
[Unit] [Unit]
Description=Shorewall IPv4 firewall (lite) Description=Shorewall IPv4 firewall (lite)
After=network-online.target After=network.target
Conflicts=iptables.service firewalld.service Conflicts=iptables.service firewalld.service
[Service] [Service]

View File

@@ -11,4 +11,4 @@
############################################################################### ###############################################################################
#ZONE INTERFACE OPTIONS #ZONE INTERFACE OPTIONS
- lo ignore - lo ignore
net all dhcp,physical=+,routeback,optional net all dhcp,physical=+,routeback

View File

@@ -58,8 +58,12 @@ loadmodule nf_nat_sip
loadmodule nf_nat_snmp_basic loadmodule nf_nat_snmp_basic
loadmodule nf_nat_tftp loadmodule nf_nat_tftp
# #
# While not actually helpers, these are handy to have # While not actually helpers, these are handy to have. Not
# all of these will be found on any given system, since
# some are aliases on later kernels.
# #
loadmodule ipt_LOG
loadmodule xt_LOG
loadmodule xt_NFLOG loadmodule xt_NFLOG
loadmodule xt_ULOG loadmodule ipt_ULOG
loadmodule nfnetlink_log loadmodule nfnetlink_log

View File

@@ -5,7 +5,7 @@
# #
[Unit] [Unit]
Description=Shorewall IPv4 firewall Description=Shorewall IPv4 firewall
After=network-online.target After=network.target
Conflicts=iptables.service firewalld.service Conflicts=iptables.service firewalld.service
[Service] [Service]

View File

@@ -5,7 +5,7 @@
# #
[Unit] [Unit]
Description=Shorewall IPv6 firewall (lite) Description=Shorewall IPv6 firewall (lite)
After=network-online.target After=network.target
Conflicts=ip6tables.service firewalld.service Conflicts=ip6tables.service firewalld.service
[Service] [Service]

View File

@@ -25,6 +25,7 @@ AutoBLL noinline # Helper for AutoBL
Broadcast noinline # Handles Broadcast/Multicast/Anycast Broadcast noinline # Handles Broadcast/Multicast/Anycast
Drop # Default Action for DROP policy Drop # Default Action for DROP policy
dropInvalid inline # Drops packets in the INVALID conntrack state dropInvalid inline # Drops packets in the INVALID conntrack state
DropSmurfs noinline # Handles packets with a broadcast source address
Established inline # Handles packets in the ESTABLISHED state Established inline # Handles packets in the ESTABLISHED state
IfEvent noinline # Perform an action based on an event IfEvent noinline # Perform an action based on an event
Invalid inline # Handles packets in the INVALID conntrack state Invalid inline # Handles packets in the INVALID conntrack state

View File

@@ -35,7 +35,11 @@ loadmodule nf_conntrack_sip
loadmodule nf_conntrack_tftp loadmodule nf_conntrack_tftp
loadmodule nf_conntrack_sane loadmodule nf_conntrack_sane
# #
# While not actually helpers, these are handy to have # While not actually helpers, these are handy to have. Not
# all of these will be found on any given system, since
# some are aliases on later kernels.
# #
loadmodule ip6t_LOG
loadmodule xt_LOG
loadmodule xt_NFLOG loadmodule xt_NFLOG
loadmodule nfnetlink_log loadmodule nfnetlink_log

View File

@@ -5,7 +5,7 @@
# #
[Unit] [Unit]
Description=Shorewall IPv6 firewall Description=Shorewall IPv6 firewall
After=network-online.target After=network.target
Conflicts=ip6tables.service firewalld.service Conflicts=ip6tables.service firewalld.service
[Service] [Service]