Update yunohost_firewall.py

add ipv6 support
This commit is contained in:
titoko 2012-12-12 16:27:12 +01:00
parent 8d8899b276
commit a7a3db1eaa

View file

@ -9,50 +9,74 @@ except ImportError:
sys.stderr.write('apt-get install python-yaml\n')
sys.exit(1)
def firewall_allow(protocol=None,port=None):
def firewall_allow(protocol=None,port=None,ip=None):
if ip == true:
ip = 'ipv6'
iptables="ip6tables"
else
ip = 'ipv4'
iptables="iptables"
if protocol == "Both":
chaineTCP="iptables -A INPUT -p tcp -i eth0 --dport "+ port +" -j ACCEPT"
chaineUDP="iptables -A INPUT -p udp -i eth0 --dport "+ port +" -j ACCEPT"
append_port(port,'tcp')
append_port(port,'udp')
os.system(chaineTCP)
os.system(chaineUDP)
TCP_rule = iptables+" -A INPUT -p tcp -i eth0 --dport "+ port +" -j ACCEPT"
UDP_rule = iptables+" -A INPUT -p udp -i eth0 --dport "+ port +" -j ACCEPT"
append_remove_port(port,'tcp','a',ip)
append_remove_port(port,'udp','a',ip)
os.system(TCP_rule)
os.system(UDP_rule)
else:
chaine="iptables -A INPUT -p "+ protocol +" -i eth0 --dport "+ port +" -j ACCEPT"
append_port(port,protocol)
os.system(chaine)
rule = iptables+" -A INPUT -p "+ protocol +" -i eth0 --dport "+ port +" -j ACCEPT"
append_remove_port(port,protocol,'a',ip)
os.system(rule)
def firewall_disallow(protocol=None,port=None):
def firewall_disallow(protocol=None,port=None,ip=None):
if ip == true:
ip = 'ipv6'
else
ip = 'ipv4'
if protocol == "Both":
chaineTCP="iptables -A INPUT -p tcp -i eth0 --dport "+ port +" -j REJECT"
chaineUDP="iptables -A INPUT -p udp -i eth0 --dport "+ port +" -j REJECT"
remove_port(port,'tcp')
remove_port(port,'udp')
os.system(chaineTCP)
os.system(chaineUDP)
TCP_rule = iptables+" -A INPUT -p tcp -i eth0 --dport "+ port +" -j REJECT"
UDP_rule = iptables+" -A INPUT -p udp -i eth0 --dport "+ port +" -j REJECT"
append_remove_port(port,'tcp','r',ip)
append_remove_port(port,'udp','r',ip)
os.system(TCP_rule)
os.system(UDP_rule)
else:
chaine="iptables -A INPUT -p "+ protocol +" -i eth0 --dport "+ port +" -j REJECT"
os.system(chaine)
remove_port(port,protocol)
os.system(chaine)
rule = iptables+" -A INPUT -p "+ protocol +" -i eth0 --dport "+ port +" -j REJECT"
append_remove_port(port,protocol,'r',ip)
os.system(rule)
def firewall_list():
'''
Parse and display firwall.yml
'''
with open ('firewall.yml') as f:
firewall = yaml.load(f)
listPortTCP=firewall['ipv4']['TCP']
listPortUDP=firewall['ipv4']['UDP']
print("Port TCP OPEN :")
for i,port in enumerate (listPortTCP):
print("-"+str(port))
print("Port UDP OPEN :")
for i,port in enumerate (listPortUDP):
print("-"+str(port))
f.close()
TCP_port_list_ipv4 = firewall['ipv4']['TCP']
UDP_port_list_ipv4 = firewall['ipv4']['UDP']
TCP_port_list_ipv6 = firewall['ipv6']['TCP']
UDP_port_list_ipv6 = firewall['ipv6']['UDP']
print("Port TCP Open for ipv4:")
for i,port in enumerate (TCP_port_list_ipv4):
print("-"+str(port))
print("Port UDP Open for ipv4 :")
for i,port in enumerate (UDP_port_list_ipv4):
print("-"+str(port))
print("Port TCP Open for ipv6:")
for i,port in enumerate (TCP_port_list_ipv6):
print("-"+str(port))
print("Port UDP Open for ipv6 :")
for i,port in enumerate (UDP_port_list_ipv6):
print("-"+str(port))
f.close()
def firewall_reload():
'''
Clear filter IPTABLE's table
@ -61,29 +85,50 @@ def firewall_reload():
Allow all port in the list
Prohibit the rest
'''
os.system("iptables -P INPUT ACCEPT")
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
TCP_port_list_ipv4 = firewall['ipv4']['TCP']
UDP_port_list_ipv4 = firewall['ipv4']['UDP']
TCP_port_list_ipv6 = firewall['ipv6']['TCP']
UDP_port_list_ipv6 = firewall['ipv6']['UDP']
f.close()
os.system ("iptables -P INPUT ACCEPT")
os.system ("iptables -F")
os.system ("iptables -X")
os.system ("iptables -A INPUT -p tcp -i eth0 --dport 22 -j ACCEPT")
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
listPortTCP=firewall['ipv4']["TCP"]
listPortUDP=firewall['ipv4']["UDP"]
for i,port in enumerate (listPortTCP):
os.system ("ip6tables -P INPUT ACCEPT")
os.system ("ip6tables -F")
os.system ("ip6tables -X")
os.system ("ip6tables -A INPUT -p tcp -i eth0 --dport 22 -j ACCEPT")
for i,port in enumerate (TCP_port_list_ipv4):
os.system ("iptables -A INPUT -p tcp -i eth0 --dport "+ str(port) +" -j ACCEPT")
for i,port in enumerate (listPortUDP):
for i,port in enumerate (UDP_port_list_ipv4):
os.system ("iptables -A INPUT -p udp -i eth0 --dport "+ str(port) +" -j ACCEPT")
os.system ("iptables -P INPUT DROP")
def append_port(port=None,protocol=None):
for i,port in enumerate (TCP_port_list_ipv6):
os.system ("ip6tables -A INPUT -p tcp -i eth0 --dport "+ str(port) +" -j ACCEPT")
for i,port in enumerate (UDP_port_list_ipv6):
os.system ("ip6tables -A INPUT -p udp -i eth0 --dport "+ str(port) +" -j ACCEPT")
os.system ("iptables -P INPUT DROP")
os.system ("ip6tables -P INPUT DROP")
def append_remove_port(port=None,protocol=None,mode=None,ip=None):
'''
Append port in firewall.yml
'''
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
if port not in firewall['ipv4'][protocol]:
firewall['ipv4'][protocol].append(int(port))
firewall['ipv4'][protocol].sort()
if port not in firewall[ip][protocol]:
if mode == 'a':
firewall[ip][protocol].append(int(port))
else:
firewall[ip][protocol].remove(int(port))
firewall[ip][protocol].sort()
f.close
os.system("mv firewall.yml firewall.yml.old")
with open('firewall.yml','w') as f:
@ -91,17 +136,4 @@ def append_port(port=None,protocol=None):
f.close
def remove_port(port=None,protocol=None):
'''
Remove port from firewall.yml
'''
with open('firewall.yml','r') as f:
firewall = yaml.load(f)
if port in firewall['ipv4'][protocol]:
firewall['ipv4'][protocol].remove(int(port))
firewall['ipv4'][protocol].sort()
f.close
os.system("mv firewall.yml firewall.yml.old")
with open('firewall.yml','w') as f:
yaml.dump(firewall,f)
f.close