92 lines
3.3 KiB
Diff
92 lines
3.3 KiB
Diff
commit 7e7be5658c2b1a8aa130480ad8e1a7314c83bba9
|
|
Author: Thomas Woerner <twoerner@redhat.com>
|
|
Date: Wed Feb 15 11:11:40 2017 +0100
|
|
|
|
firewall.core.fw_ipset: get_ipset may not ckeck if set is applied by default
|
|
|
|
This breaks the ipset overloading from /etc/firewalld/ipsets.
|
|
Fixes: #206
|
|
|
|
diff --git a/src/firewall/core/fw_ipset.py b/src/firewall/core/fw_ipset.py
|
|
index bbbc8eb..952d122 100644
|
|
--- a/src/firewall/core/fw_ipset.py
|
|
+++ b/src/firewall/core/fw_ipset.py
|
|
@@ -55,10 +55,11 @@ class FirewallIPSet(object):
|
|
def has_ipsets(self):
|
|
return len(self._ipsets) > 0
|
|
|
|
- def get_ipset(self, name):
|
|
+ def get_ipset(self, name, applied=False):
|
|
self.check_ipset(name)
|
|
obj = self._ipsets[name]
|
|
- self.check_applied_obj(obj)
|
|
+ if applied:
|
|
+ self.check_applied_obj(obj)
|
|
return obj
|
|
|
|
def _error2warning(self, f, name, *args):
|
|
@@ -141,11 +142,11 @@ class FirewallIPSet(object):
|
|
# TYPE
|
|
|
|
def get_type(self, name):
|
|
- return self.get_ipset(name).type
|
|
+ return self.get_ipset(name, applied=True).type
|
|
|
|
# DIMENSION
|
|
def get_dimension(self, name):
|
|
- return len(self.get_ipset(name).type.split(","))
|
|
+ return len(self.get_ipset(name, applied=True).type.split(","))
|
|
|
|
# APPLIED
|
|
|
|
@@ -164,7 +165,7 @@ class FirewallIPSet(object):
|
|
# OPTIONS
|
|
|
|
def get_family(self, name):
|
|
- obj = self.get_ipset(name)
|
|
+ obj = self.get_ipset(name, applied=True)
|
|
if "family" in obj.options:
|
|
if obj.options["family"] == "inet6":
|
|
return "ipv6"
|
|
@@ -179,7 +180,7 @@ class FirewallIPSet(object):
|
|
pass
|
|
|
|
def add_entry(self, name, entry):
|
|
- obj = self.get_ipset(name)
|
|
+ obj = self.get_ipset(name, applied=True)
|
|
if "timeout" in obj.options and obj.options["timeout"] != "0":
|
|
# no entries visible for ipsets with timeout
|
|
raise FirewallError(errors.IPSET_WITH_TIMEOUT, name)
|
|
@@ -201,7 +202,7 @@ class FirewallIPSet(object):
|
|
obj.entries.append(entry)
|
|
|
|
def remove_entry(self, name, entry):
|
|
- obj = self.get_ipset(name)
|
|
+ obj = self.get_ipset(name, applied=True)
|
|
if "timeout" in obj.options and obj.options["timeout"] != "0":
|
|
# no entries visible for ipsets with timeout
|
|
raise FirewallError(errors.IPSET_WITH_TIMEOUT, name)
|
|
@@ -222,7 +223,7 @@ class FirewallIPSet(object):
|
|
obj.entries.remove(entry)
|
|
|
|
def query_entry(self, name, entry):
|
|
- obj = self.get_ipset(name)
|
|
+ obj = self.get_ipset(name, applied=True)
|
|
if "timeout" in obj.options and obj.options["timeout"] != "0":
|
|
# no entries visible for ipsets with timeout
|
|
raise FirewallError(errors.IPSET_WITH_TIMEOUT, name)
|
|
@@ -230,11 +231,11 @@ class FirewallIPSet(object):
|
|
return entry in obj.entries
|
|
|
|
def get_entries(self, name):
|
|
- obj = self.get_ipset(name)
|
|
+ obj = self.get_ipset(name, applied=True)
|
|
return obj.entries
|
|
|
|
def set_entries(self, name, entries):
|
|
- obj = self.get_ipset(name)
|
|
+ obj = self.get_ipset(name, applied=True)
|
|
if "timeout" in obj.options and obj.options["timeout"] != "0":
|
|
# no entries visible for ipsets with timeout
|
|
raise FirewallError(errors.IPSET_WITH_TIMEOUT, name)
|