2012-11-16 13:16:37 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
2013-07-06 09:42:26 +02:00
|
|
|
""" License
|
|
|
|
|
|
|
|
Copyright (C) 2013 YunoHost
|
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU Affero General Public License as published
|
|
|
|
by the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU Affero General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
|
|
along with this program; if not, see http://www.gnu.org/licenses
|
|
|
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
""" yunohost_firewall.py
|
2013-07-06 10:17:16 +02:00
|
|
|
|
|
|
|
Manage firewall rules
|
2013-07-06 09:42:26 +02:00
|
|
|
"""
|
2012-11-16 13:16:37 +01:00
|
|
|
import os
|
|
|
|
import sys
|
2013-03-03 01:18:28 +01:00
|
|
|
try:
|
|
|
|
import miniupnpc
|
|
|
|
except ImportError:
|
|
|
|
sys.stderr.write('Error: Yunohost CLI Require miniupnpc lib\n')
|
|
|
|
sys.exit(1)
|
2012-12-12 11:17:07 +01:00
|
|
|
try:
|
|
|
|
import yaml
|
|
|
|
except ImportError:
|
|
|
|
sys.stderr.write('Error: Yunohost CLI Require yaml lib\n')
|
|
|
|
sys.stderr.write('apt-get install python-yaml\n')
|
|
|
|
sys.exit(1)
|
2012-12-18 00:28:03 +01:00
|
|
|
from yunohost import YunoHostError, win_msg
|
2012-11-16 13:16:37 +01:00
|
|
|
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2013-03-09 13:01:54 +01:00
|
|
|
def firewall_allow(protocol=None, port=None, ipv6=None, upnp=False):
|
2012-12-13 10:38:37 +01:00
|
|
|
"""
|
2013-07-06 10:17:16 +02:00
|
|
|
Allow connection port/protocol
|
2012-12-18 00:40:13 +01:00
|
|
|
|
2013-07-06 10:17:16 +02:00
|
|
|
Keyword argument:
|
2013-07-06 12:59:06 +02:00
|
|
|
upnp -- upnp
|
2013-07-06 10:17:16 +02:00
|
|
|
protocol -- Protocol associated with port
|
|
|
|
ipv6 -- ipv6
|
2013-03-09 13:01:54 +01:00
|
|
|
port -- Port to open
|
2012-12-18 00:40:13 +01:00
|
|
|
|
2012-12-13 10:38:37 +01:00
|
|
|
"""
|
2013-03-09 13:01:54 +01:00
|
|
|
port = int(port)
|
2013-06-29 14:21:30 +02:00
|
|
|
if upnp:
|
2013-06-24 19:25:01 +02:00
|
|
|
add_portmapping(protocol, upnp, ipv6, 'a')
|
2013-03-09 13:01:54 +01:00
|
|
|
|
|
|
|
if 0 < port < 65536:
|
2012-12-18 00:40:13 +01:00
|
|
|
if protocol == "Both":
|
2013-06-29 14:21:30 +02:00
|
|
|
update_yml(port, 'TCP', 'a', ipv6, upnp)
|
|
|
|
update_yml(port, 'UDP', 'a', ipv6, upnp)
|
2012-12-12 11:17:07 +01:00
|
|
|
|
2012-12-18 00:40:13 +01:00
|
|
|
else:
|
2013-06-29 14:21:30 +02:00
|
|
|
update_yml(port, protocol, 'a', ipv6, upnp)
|
2012-12-18 00:40:13 +01:00
|
|
|
|
|
|
|
win_msg(_("Port successfully openned"))
|
|
|
|
|
|
|
|
else:
|
2013-06-24 19:25:01 +02:00
|
|
|
raise YunoHostError(22, _("Port not between 1 and 65535:") + str(port))
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2013-02-11 14:13:36 +01:00
|
|
|
return firewall_reload(upnp)
|
2012-12-12 11:17:07 +01:00
|
|
|
|
2013-03-09 13:01:54 +01:00
|
|
|
|
|
|
|
def firewall_disallow(protocol=None, port=None, ipv6=None, upnp=False):
|
2012-12-13 10:38:37 +01:00
|
|
|
"""
|
2013-07-06 10:17:16 +02:00
|
|
|
Disallow connection
|
2012-12-18 00:40:13 +01:00
|
|
|
|
2013-07-06 10:17:16 +02:00
|
|
|
Keyword argument:
|
2013-07-06 12:59:06 +02:00
|
|
|
upnp -- upnp
|
2013-07-06 10:17:16 +02:00
|
|
|
protocol -- Protocol associated with port
|
|
|
|
ipv6 -- ipv6
|
2013-03-09 13:01:54 +01:00
|
|
|
port -- Port to open
|
2012-12-18 00:40:13 +01:00
|
|
|
|
2012-12-13 10:38:37 +01:00
|
|
|
"""
|
2012-12-12 16:27:12 +01:00
|
|
|
|
2013-03-09 13:01:54 +01:00
|
|
|
port = int(port)
|
|
|
|
if protocol == "Both":
|
2013-06-29 14:21:30 +02:00
|
|
|
update_yml(port, 'TCP', 'r', ipv6, upnp)
|
|
|
|
update_yml(port, 'UDP', 'r', ipv6, upnp)
|
2012-12-12 11:17:07 +01:00
|
|
|
else:
|
2013-06-29 14:21:30 +02:00
|
|
|
update_yml(port, protocol, 'r', ipv6, upnp)
|
2012-12-13 11:25:47 +01:00
|
|
|
win_msg(_("Port successfully closed"))
|
2012-12-18 00:40:13 +01:00
|
|
|
|
2013-02-11 14:13:36 +01:00
|
|
|
return firewall_reload(upnp)
|
2012-12-12 11:17:07 +01:00
|
|
|
|
2013-03-09 13:01:54 +01:00
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
def firewall_list():
|
2012-12-13 10:38:37 +01:00
|
|
|
"""
|
2013-07-06 10:17:16 +02:00
|
|
|
List all firewall rules
|
2012-12-18 00:40:13 +01:00
|
|
|
|
|
|
|
|
2012-12-13 10:38:37 +01:00
|
|
|
"""
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml') as f:
|
2012-12-12 17:15:12 +01:00
|
|
|
firewall = yaml.load(f)
|
2012-12-13 10:29:53 +01:00
|
|
|
return firewall
|
2013-03-04 11:30:46 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
|
2013-03-02 19:28:58 +01:00
|
|
|
def firewall_reload(upnp=False):
|
2013-07-06 09:53:43 +02:00
|
|
|
"""
|
2013-07-06 10:17:16 +02:00
|
|
|
Reload all firewall rules
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2013-07-06 10:17:16 +02:00
|
|
|
Keyword argument:
|
|
|
|
upnp -- upnp
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2013-07-06 09:53:43 +02:00
|
|
|
"""
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml', 'r') as f:
|
2012-12-12 16:27:12 +01:00
|
|
|
firewall = yaml.load(f)
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("iptables -P INPUT ACCEPT")
|
|
|
|
os.system("iptables -F")
|
|
|
|
os.system("iptables -X")
|
|
|
|
os.system("iptables -A INPUT -m state --state ESTABLISHED -j ACCEPT")
|
2013-03-09 13:01:54 +01:00
|
|
|
|
2012-12-19 17:49:04 +01:00
|
|
|
if 22 not in firewall['ipv4']['TCP']:
|
2013-03-09 13:01:54 +01:00
|
|
|
update_yml(22, 'TCP', 'a', False)
|
2012-12-12 17:53:08 +01:00
|
|
|
|
2013-06-29 14:21:30 +02:00
|
|
|
if os.path.exists("/proc/net/if_inet6"):
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("ip6tables -P INPUT ACCEPT")
|
|
|
|
os.system("ip6tables -F")
|
|
|
|
os.system("ip6tables -X")
|
|
|
|
os.system("ip6tables -A INPUT -m state --state ESTABLISHED -j ACCEPT")
|
2013-03-02 19:28:58 +01:00
|
|
|
|
2013-03-09 13:01:54 +01:00
|
|
|
if 22 not in firewall['ipv6']['TCP']:
|
|
|
|
update_yml(22, 'TCP', 'a', False)
|
2012-12-18 00:40:13 +01:00
|
|
|
|
2013-04-13 12:21:49 +02:00
|
|
|
if upnp:
|
|
|
|
remove_portmapping()
|
2013-07-06 09:53:43 +02:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
add_portmapping('TCP', upnp, False, 'r')
|
|
|
|
add_portmapping('UDP', upnp, False, 'r')
|
2013-07-06 09:53:43 +02:00
|
|
|
|
2013-06-29 14:21:30 +02:00
|
|
|
if os.path.exists("/proc/net/if_inet6"):
|
2013-06-24 19:25:01 +02:00
|
|
|
add_portmapping('TCP', upnp, True, 'r')
|
|
|
|
add_portmapping('UDP', upnp, True, 'r')
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("iptables -A INPUT -i lo -j ACCEPT")
|
|
|
|
os.system("iptables -A INPUT -p icmp -j ACCEPT")
|
|
|
|
os.system("iptables -P INPUT DROP")
|
2013-07-06 09:53:43 +02:00
|
|
|
|
2013-06-29 14:21:30 +02:00
|
|
|
if os.path.exists("/proc/net/if_inet6"):
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("ip6tables -A INPUT -i lo -j ACCEPT")
|
|
|
|
os.system("ip6tables -A INPUT -p icmp -j ACCEPT")
|
|
|
|
os.system("ip6tables -P INPUT DROP")
|
2012-12-18 00:40:13 +01:00
|
|
|
|
2013-04-13 12:21:49 +02:00
|
|
|
os.system("service fail2ban restart")
|
2012-12-13 11:25:47 +01:00
|
|
|
win_msg(_("Firewall successfully reloaded"))
|
2012-12-18 22:23:17 +01:00
|
|
|
|
2013-03-05 14:06:15 +01:00
|
|
|
return firewall_list()
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2013-03-09 13:01:54 +01:00
|
|
|
|
2013-06-29 14:21:30 +02:00
|
|
|
def update_yml(port=None, protocol=None, mode=None, ipv6=None, upnp=False):
|
2012-12-18 00:40:13 +01:00
|
|
|
"""
|
2012-12-13 10:38:37 +01:00
|
|
|
Update firewall.yml
|
|
|
|
Keyword arguments:
|
2012-12-13 11:23:10 +01:00
|
|
|
protocol -- Protocol used
|
2012-12-18 00:40:13 +01:00
|
|
|
port -- Port to open
|
2012-12-13 11:23:10 +01:00
|
|
|
mode -- a=append r=remove
|
2012-12-18 00:40:13 +01:00
|
|
|
ipv6 -- Boolean ipv6
|
2013-06-29 14:21:30 +02:00
|
|
|
upnp -- Boolean upnp
|
2012-12-18 00:40:13 +01:00
|
|
|
|
2012-12-13 11:23:10 +01:00
|
|
|
Return
|
|
|
|
None
|
2012-12-13 10:38:37 +01:00
|
|
|
"""
|
2013-06-24 19:25:01 +02:00
|
|
|
if ipv6:
|
|
|
|
ip = 'ipv6'
|
|
|
|
else:
|
|
|
|
ip = 'ipv4'
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml', 'r') as f:
|
2012-12-12 11:17:07 +01:00
|
|
|
firewall = yaml.load(f)
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
if mode == 'a':
|
2012-12-18 00:28:03 +01:00
|
|
|
if port not in firewall[ip][protocol]:
|
|
|
|
firewall[ip][protocol].append(port)
|
2013-07-07 15:48:25 +02:00
|
|
|
if not ipv6 and upnp:
|
2013-07-07 15:26:59 +02:00
|
|
|
firewall['UPNP']['ports'][protocol].append(port)
|
2013-07-07 15:48:25 +02:00
|
|
|
elif not ipv6 and upnp:
|
2013-07-07 15:26:59 +02:00
|
|
|
if port not in firewall['UPNP']['ports'][protocol]:
|
|
|
|
firewall['UPNP']['ports'][protocol].append(port)
|
2013-06-29 15:54:32 +02:00
|
|
|
else:
|
|
|
|
raise YunoHostError(22, _("Port already openned :") + str(port))
|
2013-06-29 14:21:30 +02:00
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
else:
|
2013-06-29 14:21:30 +02:00
|
|
|
raise YunoHostError(22, _("Port already openned :") + str(port))
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
else:
|
2013-07-07 15:48:25 +02:00
|
|
|
if not ipv6 and upnp:
|
2013-07-07 15:26:59 +02:00
|
|
|
if port in firewall['UPNP']['ports'][protocol]:
|
|
|
|
firewall['UPNP']['ports'][protocol].remove(port)
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2013-06-29 14:21:30 +02:00
|
|
|
else:
|
|
|
|
raise YunoHostError(22, _("Upnp redirection already deleted :") + str(port))
|
2013-07-07 15:48:25 +02:00
|
|
|
elif not ipv6:
|
2013-07-07 15:26:59 +02:00
|
|
|
if port in firewall['UPNP']['ports'][protocol]:
|
|
|
|
firewall['UPNP']['ports'][protocol].remove(port)
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2013-07-07 15:26:59 +02:00
|
|
|
if port in firewall[ip][protocol]:
|
|
|
|
firewall[ip][protocol].remove(port)
|
2012-12-18 00:28:03 +01:00
|
|
|
|
2013-07-07 15:26:59 +02:00
|
|
|
else:
|
|
|
|
raise YunoHostError(22, _("Port already closed :") + str(port))
|
|
|
|
else:
|
2013-06-29 14:21:30 +02:00
|
|
|
if port in firewall[ip][protocol]:
|
|
|
|
firewall[ip][protocol].remove(port)
|
|
|
|
|
|
|
|
else:
|
|
|
|
raise YunoHostError(22, _("Port already closed :") + str(port))
|
2013-07-07 15:26:59 +02:00
|
|
|
|
2012-12-19 17:49:04 +01:00
|
|
|
firewall[ip][protocol].sort()
|
2013-07-07 15:26:59 +02:00
|
|
|
firewall['UPNP']['ports'][protocol].sort()
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("mv /etc/yunohost/firewall.yml /etc/yunohost/firewall.yml.old")
|
2012-12-18 22:23:17 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml', 'w') as f:
|
2013-03-09 13:01:54 +01:00
|
|
|
yaml.dump(firewall, f)
|
2013-03-02 19:28:58 +01:00
|
|
|
|
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
def add_portmapping(protocol=None, upnp=False, ipv6=None, mode=None,):
|
2013-03-09 13:01:54 +01:00
|
|
|
"""
|
2013-02-11 14:13:36 +01:00
|
|
|
Send a port mapping rules to igd device
|
|
|
|
Keyword arguments:
|
|
|
|
protocol -- Protocol used
|
2013-04-13 12:21:49 +02:00
|
|
|
upnp -- Boolean upnp
|
|
|
|
ipv6 -- Boolean ipv6
|
|
|
|
mode -- Add a rule (a) or reload all rules (r)
|
2013-02-11 14:13:36 +01:00
|
|
|
|
|
|
|
Return
|
|
|
|
None
|
|
|
|
"""
|
2013-04-10 13:46:41 +02:00
|
|
|
if ipv6:
|
2013-06-24 19:59:01 +02:00
|
|
|
os.system("ip6tables -P INPUT ACCEPT")
|
2013-04-10 13:46:41 +02:00
|
|
|
else:
|
2013-06-24 19:59:01 +02:00
|
|
|
os.system("iptables -P INPUT ACCEPT")
|
2013-04-10 13:46:41 +02:00
|
|
|
|
2013-07-07 15:48:25 +02:00
|
|
|
if upnp and not ipv6 and mode == 'a':
|
2013-04-13 12:21:49 +02:00
|
|
|
remove_portmapping()
|
2013-07-06 09:53:43 +02:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
if ipv6:
|
|
|
|
ip = 'ipv6'
|
|
|
|
else:
|
|
|
|
ip = 'ipv4'
|
|
|
|
with open('/etc/yunohost/firewall.yml', 'r') as f:
|
2013-03-02 19:28:58 +01:00
|
|
|
firewall = yaml.load(f)
|
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
for i, port in enumerate(firewall[ip][protocol]):
|
2013-04-10 13:46:41 +02:00
|
|
|
if ipv6:
|
2013-07-14 16:48:29 +02:00
|
|
|
os.system("ip6tables -A INPUT -p " + protocol + " --dport " + str(port) + " -j ACCEPT")
|
2013-04-10 13:46:41 +02:00
|
|
|
else:
|
2013-07-14 16:48:29 +02:00
|
|
|
os.system("iptables -A INPUT -p " + protocol + " --dport " + str(port) + " -j ACCEPT")
|
2013-07-07 15:48:25 +02:00
|
|
|
if upnp and not ipv6:
|
2013-07-07 15:26:59 +02:00
|
|
|
if port in firewall['UPNP']['ports'][protocol]:
|
2013-06-29 14:21:30 +02:00
|
|
|
upnpc = miniupnpc.UPnP()
|
|
|
|
upnpc.discoverdelay = 200
|
|
|
|
nbigd = upnpc.discover()
|
|
|
|
if nbigd:
|
|
|
|
upnpc.selectigd()
|
|
|
|
upnpc.addportmapping(port, protocol, upnpc.lanaddr, port, 'yunohost firewall : port %u' % port, '')
|
2013-02-11 14:13:36 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("iptables -P INPUT DROP")
|
2013-02-11 14:13:36 +01:00
|
|
|
|
2013-03-11 23:07:16 +01:00
|
|
|
|
2013-04-13 12:21:49 +02:00
|
|
|
def remove_portmapping():
|
|
|
|
"""
|
|
|
|
Remove all portmapping rules in the igd device
|
|
|
|
Keyword arguments:
|
|
|
|
None
|
|
|
|
Return
|
|
|
|
None
|
|
|
|
"""
|
|
|
|
upnp = miniupnpc.UPnP()
|
|
|
|
upnp.discoverdelay = 200
|
|
|
|
nbigd = upnp.discover()
|
|
|
|
if nbigd:
|
|
|
|
try:
|
|
|
|
upnp.selectigd()
|
|
|
|
except:
|
|
|
|
firewall_reload(False)
|
2013-06-24 19:25:01 +02:00
|
|
|
raise YunoHostError(167, _("No upnp devices found"))
|
2013-04-13 12:21:49 +02:00
|
|
|
else:
|
|
|
|
firewall_reload(False)
|
2013-06-24 19:25:01 +02:00
|
|
|
raise YunoHostError(22, _("Can't connect to the igd device"))
|
2013-04-13 12:21:49 +02:00
|
|
|
|
|
|
|
# list the redirections :
|
|
|
|
for i in xrange(100):
|
|
|
|
p = upnp.getgenericportmapping(i)
|
2013-06-24 19:25:01 +02:00
|
|
|
if p is None:
|
|
|
|
break
|
2013-04-13 12:21:49 +02:00
|
|
|
upnp.deleteportmapping(p[0], p[1])
|
2013-07-06 09:53:43 +02:00
|
|
|
|
|
|
|
|
2013-03-11 23:07:16 +01:00
|
|
|
def firewall_installupnp():
|
|
|
|
"""
|
|
|
|
Add upnp cron
|
2013-07-06 10:17:16 +02:00
|
|
|
|
|
|
|
|
2013-03-11 23:07:16 +01:00
|
|
|
"""
|
2013-07-06 09:53:43 +02:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml', 'r') as f:
|
2013-04-09 22:25:43 +02:00
|
|
|
firewall = yaml.load(f)
|
|
|
|
|
2013-07-07 15:26:59 +02:00
|
|
|
firewall['UPNP']['cron'] = True
|
2013-04-09 22:25:43 +02:00
|
|
|
|
2013-03-11 23:07:16 +01:00
|
|
|
os.system("touch /etc/cron.d/yunohost-firewall")
|
|
|
|
os.system("echo '*/50 * * * * root yunohost firewall reload -u>>/dev/null'>/etc/cron.d/yunohost-firewall")
|
2013-03-13 13:32:40 +01:00
|
|
|
win_msg(_("UPNP cron installed"))
|
2013-03-13 09:34:29 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("mv /etc/yunohost/firewall.yml /etc/yunohost/firewall.yml.old")
|
2013-04-09 22:25:43 +02:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml', 'w') as f:
|
2013-04-09 22:25:43 +02:00
|
|
|
yaml.dump(firewall, f)
|
|
|
|
|
2013-03-11 23:07:16 +01:00
|
|
|
|
|
|
|
def firewall_removeupnp():
|
2013-03-15 14:28:52 +01:00
|
|
|
"""
|
|
|
|
Remove upnp cron
|
2013-07-06 10:17:16 +02:00
|
|
|
|
|
|
|
|
2013-03-15 14:28:52 +01:00
|
|
|
"""
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml', 'r') as f:
|
2013-04-09 22:25:43 +02:00
|
|
|
firewall = yaml.load(f)
|
|
|
|
|
2013-07-07 15:26:59 +02:00
|
|
|
firewall['UPNP']['cron'] = False
|
2013-03-15 14:28:52 +01:00
|
|
|
|
2013-03-13 13:32:40 +01:00
|
|
|
try:
|
|
|
|
os.remove("/etc/cron.d/yunohost-firewall")
|
|
|
|
except:
|
2013-06-24 19:25:01 +02:00
|
|
|
raise YunoHostError(167, _("UPNP cron was not installed!"))
|
2013-04-09 22:25:43 +02:00
|
|
|
|
2013-03-13 13:32:40 +01:00
|
|
|
win_msg(_("UPNP cron removed"))
|
2013-03-15 14:18:30 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("mv /etc/yunohost/firewall.yml /etc/yunohost/firewall.yml.old")
|
2013-04-09 22:25:43 +02:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml', 'w') as f:
|
2013-04-09 22:25:43 +02:00
|
|
|
yaml.dump(firewall, f)
|
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
|
2013-04-09 22:34:33 +02:00
|
|
|
def firewall_checkupnp():
|
2013-04-09 22:25:43 +02:00
|
|
|
"""
|
2013-07-06 10:17:16 +02:00
|
|
|
check if UPNP is install or not (0 yes 1 no)
|
|
|
|
|
|
|
|
|
2013-04-09 22:25:43 +02:00
|
|
|
"""
|
2013-06-24 19:25:01 +02:00
|
|
|
with open('/etc/yunohost/firewall.yml', 'r') as f:
|
2013-04-09 22:25:43 +02:00
|
|
|
firewall = yaml.load(f)
|
2013-07-06 09:53:43 +02:00
|
|
|
|
2013-07-07 15:26:59 +02:00
|
|
|
if firewall['UPNP']['cron']:
|
2013-04-09 22:25:43 +02:00
|
|
|
win_msg(_("UPNP is activated"))
|
|
|
|
else:
|
2013-06-24 19:25:01 +02:00
|
|
|
raise YunoHostError(167, _("UPNP not activated!"))
|
|
|
|
|
2013-03-15 14:18:30 +01:00
|
|
|
|
|
|
|
def firewall_stop():
|
2013-03-15 14:28:52 +01:00
|
|
|
"""
|
2013-07-06 10:17:16 +02:00
|
|
|
Stop iptables and ip6tables
|
|
|
|
|
|
|
|
|
2013-03-15 14:28:52 +01:00
|
|
|
"""
|
2013-03-15 14:18:30 +01:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("iptables -P INPUT ACCEPT")
|
|
|
|
os.system("iptables -F")
|
|
|
|
os.system("iptables -X")
|
2013-07-06 09:53:43 +02:00
|
|
|
|
2013-06-24 19:25:01 +02:00
|
|
|
os.system("ip6tables -P INPUT ACCEPT")
|
|
|
|
os.system("ip6tables -F")
|
|
|
|
os.system("ip6tables -X")
|
2013-04-09 22:25:43 +02:00
|
|
|
if(os.path.exists("/etc/cron.d/yunohost-firewall")):
|
|
|
|
firewall_removeupnp()
|