evobackup/lib/bkctld-firewall

42 lines
1.2 KiB
Plaintext
Raw Normal View History

#!/bin/sh
#
# Description: Update firewall rules
# Usage: firewall [<jailname>|all]
#
2020-04-02 13:44:13 +02:00
# shellcheck source=./includes
2020-04-02 00:31:57 +02:00
LIBDIR="$(dirname $0)" && . "${LIBDIR}/includes"
2020-04-02 13:44:13 +02:00
jail_name="${1:?}"
2020-04-02 01:07:12 +02:00
2020-04-02 14:43:17 +02:00
if [ -z "${jail_name}" ]; then
show_help && exit 1
fi
2020-04-02 01:07:12 +02:00
jail_path=$(jail_path "${jail_name}")
iptables_input_accept() {
jail_name="${1}"
port="${2}"
ip="${3}"
2020-04-20 08:29:21 +02:00
debug "Accept \`${ip}:${port}' for jail \`${jail_name}'"
2020-04-02 01:07:12 +02:00
echo "/sbin/iptables -A INPUT -p tcp --sport 1024: --dport ${port} -s ${ip} -j ACCEPT #${jail_name}"
}
if [ -n "${FIREWALL_RULES}" ]; then
# remove existing rules for this jail
2022-03-22 15:33:00 +01:00
[ -f "${FIREWALL_RULES}" ] && sed --follow-symlinks --in-place "/#${jail_name}$/d" "${FIREWALL_RULES}"
2020-04-02 01:07:12 +02:00
if [ -d "${jail_path}" ]; then
port=$("${LIBDIR}/bkctld-port" "${jail_name}")
# Add a rule for each IP
2020-04-02 01:07:12 +02:00
for ip in $("${LIBDIR}/bkctld-ip" "${jail_name}"); do
iptables_input_accept "${jail_name}" "${port}" "${ip}" >> "${FIREWALL_RULES}"
done
# Restart the firewall
[ -f /etc/init.d/minifirewall ] && /etc/init.d/minifirewall restart >/dev/null
fi
2020-04-20 08:29:21 +02:00
notice "Firewall updated for jail \`${jail_name}'"
else
2020-04-20 08:29:21 +02:00
notice "Skip jail \`${jail_name}' : FIREWALL_RULES variable is empty."
fi