You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					110 lines
				
				3.1 KiB
			
		
		
			
		
	
	
					110 lines
				
				3.1 KiB
			| 
								 
											2 years ago
										 
									 | 
							
								#!/bin/bash
							 | 
						||
| 
								 | 
							
								# info: add firewall rule
							 | 
						||
| 
								 | 
							
								# options: ACTION IP PORT [PROTOCOL] [COMMENT] [RULE]
							 | 
						||
| 
								 | 
							
								#
							 | 
						||
| 
								 | 
							
								# example: v-add-firewall-rule DROP 185.137.111.77 25
							 | 
						||
| 
								 | 
							
								#
							 | 
						||
| 
								 | 
							
								# This function adds new rule to system firewall
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								#----------------------------------------------------------#
							 | 
						||
| 
								 | 
							
								#                Variables & Functions                     #
							 | 
						||
| 
								 | 
							
								#----------------------------------------------------------#
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Argument definition
							 | 
						||
| 
								 | 
							
								action=$(echo $1 | tr '[:lower:]' '[:upper:]')
							 | 
						||
| 
								 | 
							
								ip=$2
							 | 
						||
| 
								 | 
							
								port_ext=$3
							 | 
						||
| 
								 | 
							
								protocol=${4-TCP}
							 | 
						||
| 
								 | 
							
								protocol=$(echo $protocol | tr '[:lower:]' '[:upper:]')
							 | 
						||
| 
								 | 
							
								comment=$5
							 | 
						||
| 
								 | 
							
								rule=$6
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Includes
							 | 
						||
| 
								 | 
							
								# shellcheck source=/etc/hestiacp/hestia.conf
							 | 
						||
| 
								 | 
							
								source /etc/hestiacp/hestia.conf
							 | 
						||
| 
								 | 
							
								# shellcheck source=/usr/local/hestia/func/main.sh
							 | 
						||
| 
								 | 
							
								source $HESTIA/func/main.sh
							 | 
						||
| 
								 | 
							
								# load config file
							 | 
						||
| 
								 | 
							
								source_conf "$HESTIA/conf/hestia.conf"
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Get next firewall rule id
							 | 
						||
| 
								 | 
							
								get_next_fw_rule() {
							 | 
						||
| 
								 | 
							
									if [ -z "$rule" ]; then
							 | 
						||
| 
								 | 
							
										curr_str=$(grep "RULE=" $HESTIA/data/firewall/rules.conf \
							 | 
						||
| 
								 | 
							
											| cut -f 2 -d \' | sort -n | tail -n1)
							 | 
						||
| 
								 | 
							
										rule="$((curr_str + 1))"
							 | 
						||
| 
								 | 
							
									fi
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								sort_fw_rules() {
							 | 
						||
| 
								 | 
							
									cat $HESTIA/data/firewall/rules.conf \
							 | 
						||
| 
								 | 
							
										| sort -n -k 2 -t \' > $HESTIA/data/firewall/rules.conf.tmp
							 | 
						||
| 
								 | 
							
									mv -f $HESTIA/data/firewall/rules.conf.tmp \
							 | 
						||
| 
								 | 
							
										$HESTIA/data/firewall/rules.conf
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								#----------------------------------------------------------#
							 | 
						||
| 
								 | 
							
								#                    Verifications                         #
							 | 
						||
| 
								 | 
							
								#----------------------------------------------------------#
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								check_args '3' "$#" 'ACTION IP PORT [PROTOCOL] [COMMENT] [RULE]'
							 | 
						||
| 
								 | 
							
								is_format_valid 'action' 'protocol' 'port_ext'
							 | 
						||
| 
								 | 
							
								is_system_enabled "$FIREWALL_SYSTEM" 'FIREWALL_SYSTEM'
							 | 
						||
| 
								 | 
							
								get_next_fw_rule
							 | 
						||
| 
								 | 
							
								is_format_valid 'rule'
							 | 
						||
| 
								 | 
							
								is_object_new '../../data/firewall/rules' 'RULE' "$rule"
							 | 
						||
| 
								 | 
							
								if [ -n "$comment" ]; then
							 | 
						||
| 
								 | 
							
									is_format_valid 'comment'
							 | 
						||
| 
								 | 
							
								fi
							 | 
						||
| 
								 | 
							
								if [[ "$ip" =~ ^ipset: ]]; then
							 | 
						||
| 
								 | 
							
									ipset_name="${ip#ipset:}"
							 | 
						||
| 
								 | 
							
									$BIN/v-list-firewall-ipset plain | grep "^$ipset_name\s" > /dev/null
							 | 
						||
| 
								 | 
							
									check_result $? 'ipset object not found' "$E_NOTEXIST"
							 | 
						||
| 
								 | 
							
								else
							 | 
						||
| 
								 | 
							
									is_format_valid 'ip'
							 | 
						||
| 
								 | 
							
								fi
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Perform verification if read-only mode is enabled
							 | 
						||
| 
								 | 
							
								check_hestia_demo_mode
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								#----------------------------------------------------------#
							 | 
						||
| 
								 | 
							
								#                       Action                             #
							 | 
						||
| 
								 | 
							
								#----------------------------------------------------------#
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Generating timestamp
							 | 
						||
| 
								 | 
							
								time_n_date=$(date +'%T %F')
							 | 
						||
| 
								 | 
							
								time=$(echo "$time_n_date" | cut -f 1 -d \ )
							 | 
						||
| 
								 | 
							
								date=$(echo "$time_n_date" | cut -f 2 -d \ )
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Concatenating rule
							 | 
						||
| 
								 | 
							
								str="RULE='$rule' ACTION='$action' PROTOCOL='$protocol' PORT='$port_ext'"
							 | 
						||
| 
								 | 
							
								str="$str IP='$ip' COMMENT='$comment' SUSPENDED='no'"
							 | 
						||
| 
								 | 
							
								str="$str TIME='$time' DATE='$date'"
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Adding to config
							 | 
						||
| 
								 | 
							
								echo "$str" >> $HESTIA/data/firewall/rules.conf
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Changing permissions
							 | 
						||
| 
								 | 
							
								chmod 660 $HESTIA/data/firewall/rules.conf
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Sorting firewall rules by id number
							 | 
						||
| 
								 | 
							
								sort_fw_rules
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Updating system firewall
							 | 
						||
| 
								 | 
							
								$BIN/v-update-firewall
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								#----------------------------------------------------------#
							 | 
						||
| 
								 | 
							
								#                       Hestia                             #
							 | 
						||
| 
								 | 
							
								#----------------------------------------------------------#
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Fix missing port value in log if zero
							 | 
						||
| 
								 | 
							
								if [ -z "$port" ]; then
							 | 
						||
| 
								 | 
							
									port="0"
							 | 
						||
| 
								 | 
							
								fi
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								# Logging
							 | 
						||
| 
								 | 
							
								$BIN/v-log-action "system" "Info" "Firewall" "Added firewall rule (Action: $action, Port: $port, Protocol: $protocol)."
							 | 
						||
| 
								 | 
							
								log_event "$OK" "$ARGUMENTS"
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								exit
							 |