moulinette/yunohost_firewall.py

199 lines
4.8 KiB
Python
Raw Normal View History

2012-11-16 13:16:37 +01:00
# -*- coding: utf-8 -*-
import os
import sys
try:
import yaml
except ImportError:
sys.stderr.write('Error: Yunohost CLI Require yaml lib\n')
sys.stderr.write('apt-get install python-yaml\n')
sys.exit(1)
2012-11-16 13:16:37 +01:00
2012-12-12 17:15:12 +01:00
def firewall_allow(protocol=None,port=None,ipv6=None):
"""
Allow port in iptables
Keyword arguments:
protocol -- Protocol used
port -- Port to open
ipv6 -- Boolean ipv6
Return
Dict
"""
if ipv6 == True:
2012-12-12 17:15:12 +01:00
ip = 'ipv6'
iptables="ip6tables"
else:
ip = 'ipv4'
iptables="iptables"
if protocol == "Both":
TCP_rule = iptables+" -A INPUT -p tcp -i eth0 --dport "+ port +" -j ACCEPT"
2012-12-12 17:15:12 +01:00
UDP_rule = iptables+" -A INPUT -p udp -i eth0 --dport "+ port +" -j ACCEPT"
update_yml(port,'tcp','a',ip)
update_yml(port,'udp','a',ip)
2012-12-12 17:15:12 +01:00
os.system(TCP_rule)
os.system(UDP_rule)
else:
rule = iptables+" -A INPUT -p "+ protocol +" -i eth0 --dport "+ port +" -j ACCEPT"
update_yml(port,protocol,'a',ip)
os.system(rule)
2012-12-13 11:25:47 +01:00
win_msg(_("Port successfully openned"))
return firewall_list()
2012-12-12 17:15:12 +01:00
def firewall_disallow(protocol=None,port=None,ipv6=None):
"""
Disallow port in iptables
Keyword arguments:
protocol -- Protocol used
port -- Port to open
ipv6 -- Boolean ipv6
Return
Dict
"""
if ipv6 == True:
2012-12-12 17:15:12 +01:00
ip = 'ipv6'
2012-12-12 17:53:08 +01:00
iptables="ip6tables"
2012-12-12 17:15:12 +01:00
else:
ip = 'ipv4'
2012-12-12 17:53:08 +01:00
iptables="ip6tables"
2012-12-12 17:15:12 +01:00
if protocol == "Both":
TCP_rule = iptables+" -A INPUT -p tcp -i eth0 --dport "+ port +" -j REJECT"
UDP_rule = iptables+" -A INPUT -p udp -i eth0 --dport "+ port +" -j REJECT"
update_yml(port,'tcp','r',ip)
update_yml(port,'udp','r',ip)
os.system(TCP_rule)
os.system(UDP_rule)
else:
rule = iptables+" -A INPUT -p "+ protocol +" -i eth0 --dport "+ port +" -j REJECT"
update_yml(port,protocol,'r',ip)
os.system(rule)
2012-12-13 11:25:47 +01:00
win_msg(_("Port successfully closed"))
return firewall_list
2012-12-12 17:15:12 +01:00
def firewall_list():
"""
Allow port in iptables
Keyword arguments:
None
Return
Dict
"""
with open ('firewall.yml') as f:
2012-12-12 17:15:12 +01:00
firewall = yaml.load(f)
return firewall
2012-12-12 17:15:12 +01:00
def firewall_reload():
'''
Reload iptables configuration
Keyword arguments:
None
Return
Dict
2012-12-12 17:15:12 +01:00
'''
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
2012-12-12 17:15:12 +01:00
os.system ("iptables -P INPUT ACCEPT")
os.system ("iptables -F")
os.system ("iptables -X")
os.system ("iptables -A INPUT -p tcp -i eth0 --dport 22 -j ACCEPT")
update_yml('22','TCP','a',False)
2012-12-12 17:53:08 +01:00
2012-12-12 17:15:12 +01:00
os.system ("ip6tables -P INPUT ACCEPT")
os.system ("ip6tables -F")
os.system ("ip6tables -X")
os.system ("ip6tables -A INPUT -p tcp -i eth0 --dport 22 -j ACCEPT")
update_yml('22','TCP','a',True)
2012-12-12 17:15:12 +01:00
for i,port in enumerate (firewall['ipv4']['TCP']):
2012-12-12 11:50:07 +01:00
os.system ("iptables -A INPUT -p tcp -i eth0 --dport "+ str(port) +" -j ACCEPT")
2012-12-12 17:15:12 +01:00
for i,port in enumerate (firewall['ipv4']['UDP']):
2012-12-12 11:50:07 +01:00
os.system ("iptables -A INPUT -p udp -i eth0 --dport "+ str(port) +" -j ACCEPT")
2012-12-12 17:15:12 +01:00
for i,port in enumerate (firewall['ipv6']['TCP']):
os.system ("ip6tables -A INPUT -p tcp -i eth0 --dport "+ str(port) +" -j ACCEPT")
2012-12-12 17:15:12 +01:00
for i,port in enumerate (firewall['ipv6']['UDP']):
os.system ("ip6tables -A INPUT -p udp -i eth0 --dport "+ str(port) +" -j ACCEPT")
2012-12-12 17:15:12 +01:00
os.system ("iptables -P INPUT DROP")
os.system ("ip6tables -P INPUT DROP")
2012-12-13 11:25:47 +01:00
win_msg(_("Firewall successfully reloaded"))
return firewall_list()
2012-12-12 17:15:12 +01:00
def update_yml(port=None,protocol=None,mode=None,ip=None):
"""
Update firewall.yml
Keyword arguments:
protocol -- Protocol used
port -- Port to open
mode -- a=append r=remove
ipv6 -- Boolean ipv6
Return
None
"""
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
if mode == 'a':
if int(port) not in firewall[ip][protocol]:
firewall[ip][protocol].append(int(port))
print("Port "+port+" on protocol "+protocol+" with "+ip+" Open")
else:
print("Port already open")
else:
if int(port) in firewall[ip][protocol]:
firewall[ip][protocol].remove(int(port))
print("Port "+port+" on protocol "+protocol+" with "+ip+" Close")
2012-12-12 17:27:26 +01:00
else:
print("Port already close")
2012-12-12 17:27:26 +01:00
firewall[ip][protocol].sort()
2012-12-12 17:15:12 +01:00
os.system("mv firewall.yml firewall.yml.old")
with open('firewall.yml','w') as f:
yaml.dump(firewall,f)