moulinette/yunohost_firewall.py

253 lines
6 KiB
Python
Raw Normal View History

2012-11-16 13:16:37 +01:00
# -*- coding: utf-8 -*-
import os
import sys
2013-03-03 01:18:28 +01:00
try:
import miniupnpc
except ImportError:
sys.stderr.write('Error: Yunohost CLI Require miniupnpc lib\n')
sys.exit(1)
try:
import yaml
except ImportError:
sys.stderr.write('Error: Yunohost CLI Require yaml lib\n')
sys.stderr.write('apt-get install python-yaml\n')
sys.exit(1)
2012-12-18 00:28:03 +01:00
from yunohost import YunoHostError, win_msg
2012-11-16 13:16:37 +01:00
2012-12-12 17:15:12 +01:00
def firewall_allow(protocol=None,port=None,ipv6=None,upnp=False):
"""
Allow port in iptables
2012-12-18 00:40:13 +01:00
Keyword arguments:
protocol -- Protocol used
port -- Port to open
ipv6 -- Boolean ipv6
2013-02-11 14:13:36 +01:00
upnp --Boolean upnp
Return
Dict
2012-12-18 00:40:13 +01:00
"""
port=int(port)
if (upnp):
add_portmapping(protocol, upnp, ipv6)
if port<65536 and port>0:
2012-12-18 00:40:13 +01:00
if protocol == "Both":
2012-12-19 18:17:37 +01:00
update_yml(port,'TCP','a',ipv6)
update_yml(port,'UDP','a',ipv6)
2012-12-18 00:40:13 +01:00
else:
update_yml(port,protocol,'a',ipv6)
win_msg(_("Port successfully openned"))
else:
2012-12-19 18:17:37 +01:00
raise YunoHostError(22,_("Port not between 1 and 65535 : ")+str(port))
2012-12-18 00:28:03 +01:00
2013-02-11 14:13:36 +01:00
return firewall_reload(upnp)
def firewall_disallow(protocol=None,port=None,ipv6=None,upnp=False):
"""
Disallow port in iptables
2012-12-18 00:40:13 +01:00
Keyword arguments:
protocol -- Protocol used
port -- Port to open
ipv6 -- Boolean ipv6
2013-02-11 14:13:36 +01:00
upnp --Boolan upnp
2012-12-18 00:40:13 +01:00
Return
Dict
2012-12-18 00:40:13 +01:00
"""
port=int(port)
2012-12-18 00:28:03 +01:00
if protocol == "Both":
2012-12-19 18:17:37 +01:00
update_yml(port,'TCP','r',ipv6)
update_yml(port,'UDP','r',ipv6)
else:
2012-12-18 00:28:03 +01:00
update_yml(port,protocol,'r',ipv6)
2012-12-13 11:25:47 +01:00
win_msg(_("Port successfully closed"))
2012-12-18 00:40:13 +01:00
2013-02-11 14:13:36 +01:00
return firewall_reload(upnp)
def firewall_list():
"""
Allow port in iptables
2012-12-18 00:40:13 +01:00
Keyword arguments:
None
2012-12-18 00:40:13 +01:00
Return
Dict
2012-12-18 00:40:13 +01:00
"""
with open ('firewall.yml') as f:
2012-12-12 17:15:12 +01:00
firewall = yaml.load(f)
return firewall
def firewall_reload(upnp=False):
'''
Reload iptables configuration
2012-12-18 00:28:03 +01:00
Keyword arguments:
2013-02-11 14:13:36 +01:00
upnp --Boolean upnp
2012-12-18 00:28:03 +01:00
Return
Dict
2012-12-12 17:15:12 +01:00
'''
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
2012-12-12 17:15:12 +01:00
os.system ("iptables -P INPUT ACCEPT")
os.system ("iptables -F")
os.system ("iptables -X")
if 22 not in firewall['ipv4']['TCP']:
update_yml(22,'TCP','a',False)
2012-12-12 17:53:08 +01:00
2012-12-12 17:15:12 +01:00
os.system ("ip6tables -P INPUT ACCEPT")
os.system ("ip6tables -F")
os.system ("ip6tables -X")
if 22 not in firewall['ipv6']['TCP']:
update_yml(22,'TCP','a',False)
2012-12-12 17:15:12 +01:00
add_portmapping('TCP',upnp,False);
add_portmapping('UDP',upnp,False);
add_portmapping('TCP',upnp,True);
add_portmapping('UDP',upnp,True);
2012-12-12 17:15:12 +01:00
"""for i,port in enumerate (firewall['ipv4']['TCP']):
2012-12-12 11:50:07 +01:00
os.system ("iptables -A INPUT -p tcp -i eth0 --dport "+ str(port) +" -j ACCEPT")
2013-02-11 14:13:36 +01:00
if upnp:
add_portmapping(port,'TCP',upnp)
2012-12-18 00:40:13 +01:00
2012-12-12 17:15:12 +01:00
for i,port in enumerate (firewall['ipv4']['UDP']):
2012-12-12 11:50:07 +01:00
os.system ("iptables -A INPUT -p udp -i eth0 --dport "+ str(port) +" -j ACCEPT")
2013-02-11 14:13:36 +01:00
if upnp:
add_portmapping(port,'UDP',upnp)
2012-12-18 00:40:13 +01:00
2012-12-12 17:15:12 +01:00
for i,port in enumerate (firewall['ipv6']['TCP']):
os.system ("ip6tables -A INPUT -p tcp -i eth0 --dport "+ str(port) +" -j ACCEPT")
2013-02-11 14:13:36 +01:00
if upnp:
add_portmapping(port,'TCP',upnp)
2012-12-18 00:40:13 +01:00
2012-12-12 17:15:12 +01:00
for i,port in enumerate (firewall['ipv6']['UDP']):
os.system ("ip6tables -A INPUT -p udp -i eth0 --dport "+ str(port) +" -j ACCEPT")
2013-02-11 14:13:36 +01:00
if upnp:
add_portmapping(port,'UDP',upnp)"""
2012-12-18 00:40:13 +01:00
2012-12-12 17:15:12 +01:00
os.system ("iptables -P INPUT DROP")
os.system ("ip6tables -P INPUT DROP")
2012-12-18 00:40:13 +01:00
2012-12-13 11:25:47 +01:00
win_msg(_("Firewall successfully reloaded"))
2012-12-18 22:23:17 +01:00
2013-03-05 14:06:15 +01:00
return firewall_list()
2012-12-12 17:15:12 +01:00
2012-12-18 00:28:03 +01:00
def update_yml(port=None,protocol=None,mode=None,ipv6=None):
2012-12-18 00:40:13 +01:00
"""
Update firewall.yml
Keyword arguments:
protocol -- Protocol used
2012-12-18 00:40:13 +01:00
port -- Port to open
mode -- a=append r=remove
2012-12-18 00:40:13 +01:00
ipv6 -- Boolean ipv6
Return
None
"""
2012-12-18 00:28:03 +01:00
if ipv6:
ip = 'ipv6'
else:
ip = 'ipv4'
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
2012-12-18 00:28:03 +01:00
if mode == 'a':
2012-12-18 00:28:03 +01:00
if port not in firewall[ip][protocol]:
firewall[ip][protocol].append(port)
else:
2012-12-19 18:17:37 +01:00
raise YunoHostError(22,_("Port already openned :")+str(port))
2012-12-18 00:28:03 +01:00
else:
2012-12-18 00:28:03 +01:00
if port in firewall[ip][protocol]:
firewall[ip][protocol].remove(port)
2012-12-12 17:27:26 +01:00
else:
2012-12-19 18:17:37 +01:00
raise YunoHostError(22,_("Port already closed :")+str(port))
2012-12-18 00:28:03 +01:00
firewall[ip][protocol].sort()
2012-12-12 17:15:12 +01:00
os.system("mv firewall.yml firewall.yml.old")
2012-12-18 22:23:17 +01:00
with open('firewall.yml','w') as f:
yaml.dump(firewall,f)
2013-02-11 14:13:36 +01:00
def add_portmapping(protocol=None,upnp=False,ipv6=None):
2013-02-11 14:13:36 +01:00
"""
2013-02-11 14:13:36 +01:00
Send a port mapping rules to igd device
Keyword arguments:
protocol -- Protocol used
port -- Port to open
Return
None
"""
2013-03-09 12:11:36 +01:00
os.system ("iptables -P INPUT ACCEPT")
if upnp:
upnp=miniupnpc.UPnP()
upnp.discoverdelay=200
nbigd= upnp.discover()
if nbigd:
try:
upnp.selectigd()
except:
firewall_reload(False)
raise YunoHostError(167,_("No upnp devices found"))
else:
firewall_reload(False)
raise YunoHostError(22,_("Can't connect to the igd device"))
# list the redirections :
i = 0
for i in (0,100):
p = upnp.getgenericportmapping(i)
if p==None:
break
port=p[0]
proto=p[1]
upnp.deleteportmapping(port,proto);
i += 1
if ipv6:
ip = 'ipv6'
else:
ip = 'ipv4'
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
for i,port in enumerate (firewall[ip][protocol]):
2013-03-03 01:18:28 +01:00
os.system ("iptables -A INPUT -p "+ protocol +" -i eth0 --dport "+ str(port) +" -j ACCEPT")
if upnp:
upnp.addportmapping(port,protocol,upnp.lanaddr,port,'yunohost firewall : port %u' % port, '')
2013-02-11 14:13:36 +01:00
2013-03-09 12:11:36 +01:00
os.system ("iptables -P INPUT DROP")$