f1cb09a2d3
The content of this branch was automatically imported from Fedora ELN with the following as its source: https://src.fedoraproject.org/rpms/ipset#c937e6ad0a272b39d0535b69057ba5d9eac9441d
210 lines
5.2 KiB
Bash
210 lines
5.2 KiB
Bash
#!/bin/bash
|
|
#
|
|
# ipset Start and stop ipset firewall sets
|
|
#
|
|
# config: /etc/ipset/ipset
|
|
#
|
|
|
|
IPSET=ipset
|
|
IPSET_BIN=/usr/sbin/${IPSET}
|
|
IPSET_DATA=/etc/${IPSET}/${IPSET}
|
|
|
|
IPTABLES_CONFIG=/etc/sysconfig/iptables-config
|
|
IP6TABLES_CONFIG=${IPTABLES_CONFIG/iptables/ip6tables}
|
|
|
|
TMP_FIFO=/tmp/${IPSET}.$$
|
|
|
|
if [[ ! -x ${IPSET_BIN} ]]; then
|
|
echo "${IPSET_BIN} does not exist."
|
|
exit 5
|
|
fi
|
|
|
|
CLEAN_FILES=TMP_FIFO
|
|
trap "rm -f \$CLEAN_FILES" EXIT
|
|
|
|
# Default ipset configuration:
|
|
[[ -z $IPSET_SAVE_ON_STOP ]] && IPSET_SAVE_ON_STOP=no # Overridden by ip(6)tables IP(6)TABLES_SAVE_ON_STOP
|
|
[[ -z $IPSET_SAVE_ON_RESTART ]] && IPSET_SAVE_ON_RESTART=no # Overridden by ip(6)tables IP(6)TABLES_SAVE_ON_RESTART
|
|
|
|
# Load iptables configuration(s)
|
|
[[ -f "$IPTABLES_CONFIG" ]] && . "$IPTABLES_CONFIG"
|
|
[[ -f "$IP6TABLES_CONFIG" ]] && . "$IP6TABLES_CONFIG"
|
|
|
|
# It doesn't make sense to save iptables config and not our config
|
|
[[ ${IPTABLES_SAVE_ON_STOP} = yes || ${IP6TABLES_SAVE_ON_STOP} = yes ]] && IPSET_SAVE_ON_STOP=yes
|
|
[[ ${IPTABLES_SAVE_ON_RESTART} = yes || ${IP6TABLES_SAVE_ON_RESTART} = yes ]] && IPSET_SAVE_ON_RESTART=yes
|
|
|
|
check_can_unload() {
|
|
# If the xt_set module is loaded and can't be unloaded, then iptables is
|
|
# using ipsets, so refuse to stop the service.
|
|
if [[ -n $(lsmod | grep "^xt_set ") ]]; then
|
|
rmmod xt_set 2>/dev/null
|
|
[[ $? -ne 0 ]] && echo Current iptables configuration requires ipsets && return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
flush_n_delete() {
|
|
local ret=0 set
|
|
|
|
# Flush sets
|
|
${IPSET_BIN} flush
|
|
let ret+=$?
|
|
|
|
# Delete ipset sets. If we don't do them individually, then none
|
|
# will be deleted unless they all can be.
|
|
for set in $(${IPSET_BIN} list -name); do
|
|
${IPSET_BIN} destroy 2>/dev/null
|
|
[[ $? -ne 0 ]] && ret=1
|
|
done
|
|
|
|
return $ret
|
|
}
|
|
|
|
start_clean()
|
|
{
|
|
mkfifo -m go= "${TMP_FIFO}"
|
|
[[ $? -ne 0 ]] && return 1
|
|
|
|
# Get the lists of sets in current(old) config and new config
|
|
old_sets="$(${IPSET_BIN} list -name | sort -u)"
|
|
new_sets="$(grep ^create "${IPSET_DATA}" | cut -d " " -f 2 | sort -u)"
|
|
|
|
# List of sets no longer wanted
|
|
drop_sets="$( printf "%s\n" "${old_sets}" > "${TMP_FIFO}" &
|
|
printf "%s\n" "${new_sets}" | comm -23 "${TMP_FIFO}" -
|
|
)"
|
|
|
|
# Get rid of sets no longer needed
|
|
# Unfortunately -! doesn't work for destroy, so we have to do it a command at a time
|
|
for dset in $drop_sets; do
|
|
ipset destroy $dset 2>/dev/null
|
|
# If it won't go - ? in use by iptables, just clear it
|
|
[[ $? -ne 0 ]] && ipset flush $dset
|
|
done
|
|
|
|
# Now delete the set members no longer required
|
|
${IPSET_BIN} save | grep "^add " | sort >${TMP_FIFO} &
|
|
grep "^add " ${IPSET_DATA} | sort | comm -23 ${TMP_FIFO} - | sed -e "s/^add /del /" \
|
|
| ${IPSET_BIN} restore -!
|
|
|
|
# At last we can add the set members we haven't got
|
|
ipset restore -! <${IPSET_DATA}
|
|
|
|
rm ${TMP_FIFO}
|
|
|
|
return 0
|
|
}
|
|
|
|
start() {
|
|
# Do not start if there is no config file.
|
|
[[ ! -f "$IPSET_DATA" ]] && echo "Loaded with no configuration" && return 0
|
|
|
|
# We can skip the first bit and do a simple load if
|
|
# there is no current ipset configuration
|
|
res=1
|
|
if [[ -n $(${IPSET_BIN} list -name) ]]; then
|
|
# The following may fail for some bizarre reason
|
|
start_clean
|
|
res=$?
|
|
|
|
[[ $res -ne 0 ]] && echo "Some old configuration may remain"
|
|
fi
|
|
|
|
# res -ne 0 => either start_clean failed, or we didn't need to run it
|
|
if [[ $res -ne 0 ]]; then
|
|
# This is the easy way to start but would leave any old
|
|
# entries still configured. Still, better than nothing -
|
|
# but fine if we had no config
|
|
${IPSET_BIN} restore -! <${IPSET_DATA}
|
|
res=$?
|
|
fi
|
|
|
|
if [[ $res -ne 0 ]]; then
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
stop() {
|
|
# Nothing to stop if ip_set module is not loaded.
|
|
lsmod | grep -q "^ip_set "
|
|
[[ $? -ne 0 ]] && return 6
|
|
|
|
flush_n_delete
|
|
[[ $? -ne 0 ]] && echo Warning: Not all sets were flushed/deleted
|
|
|
|
return 0
|
|
}
|
|
|
|
save() {
|
|
# Do not save if ip_set module is not loaded.
|
|
lsmod | grep -q "^ip_set "
|
|
[[ $? -ne 0 ]] && return 6
|
|
|
|
[[ -z $(${IPSET_BIN} list -name) ]] && return 0
|
|
|
|
ret=0
|
|
TMP_FILE=$(/bin/mktemp -q /tmp/$IPSET.XXXXXX) \
|
|
&& CLEAN_FILES+=" $TMP_FILE" \
|
|
&& chmod 600 "$TMP_FILE" \
|
|
&& ${IPSET_BIN} save > $TMP_FILE 2>/dev/null \
|
|
&& [[ -s $TMP_FILE ]] \
|
|
|| ret=1
|
|
|
|
if [[ $ret -eq 0 ]]; then
|
|
# No need to do anything if the files are the same
|
|
if [[ ! -f $IPSET_DATA ]]; then
|
|
mv $TMP_FILE $IPSET_DATA && chmod 600 $IPSET_DATA || ret=1
|
|
else
|
|
diff -q $TMP_FILE $IPSET_DATA >/dev/null
|
|
|
|
if [[ $? -ne 0 ]]; then
|
|
if [[ -f $IPSET_DATA ]]; then
|
|
cp -f --preserve=timestamps $IPSET_DATA $IPSET_DATA.save \
|
|
&& chmod 600 $IPSET_DATA.save \
|
|
|| ret=1
|
|
fi
|
|
if [[ $ret -eq 0 ]]; then
|
|
cp -f --preserve=timestamps $TMP_FILE $IPSET_DATA \
|
|
&& chmod 600 $IPSET_DATA \
|
|
|| ret=1
|
|
fi
|
|
fi
|
|
fi
|
|
fi
|
|
|
|
rm -f $TMP_FILE
|
|
return $ret
|
|
}
|
|
|
|
|
|
case "$1" in
|
|
start)
|
|
start
|
|
RETVAL=$?
|
|
;;
|
|
stop)
|
|
check_can_unload || exit 1
|
|
[[ $IPSET_SAVE_ON_STOP = yes ]] && save
|
|
stop
|
|
RETVAL=$?
|
|
[[ $RETVAL -eq 6 ]] && echo "${IPSET}: not running" && exit 0
|
|
;;
|
|
reload)
|
|
[[ $IPSET_SAVE_ON_RESTART = yes ]] && save
|
|
stop
|
|
RETVAL=$?
|
|
[[ $RETVAL -eq 6 ]] && echo "${IPSET}: not running" && exit 0
|
|
start
|
|
RETVAL=$?
|
|
;;
|
|
*)
|
|
echo "Usage: $IPSET {start|stop|reload}" >&2
|
|
exit 1
|
|
esac
|
|
|
|
exit $RETVAL
|