You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
89 lines
2.6 KiB
89 lines
2.6 KiB
#!/bin/bash
|
|
# info: delete firewall blocking rule
|
|
# options: IP CHAIN
|
|
#
|
|
# example: v-delete-firewall-ban 198.11.130.250 MAIL
|
|
#
|
|
# This function deletes blocking rule from system firewall
|
|
|
|
#----------------------------------------------------------#
|
|
# Variables & Functions #
|
|
#----------------------------------------------------------#
|
|
|
|
# Argument definition
|
|
ip=$1
|
|
chain=$(echo $2 | tr '[:lower:]' '[:upper:]')
|
|
|
|
# Defining absolute path for iptables and modprobe
|
|
iptables="/sbin/iptables"
|
|
|
|
# Includes
|
|
# shellcheck source=/etc/hestiacp/hestia.conf
|
|
source /etc/hestiacp/hestia.conf
|
|
# shellcheck source=/usr/local/hestia/func/main.sh
|
|
source $HESTIA/func/main.sh
|
|
# shellcheck source=/usr/local/hestia/func/firewall.sh
|
|
source $HESTIA/func/firewall.sh
|
|
# load config file
|
|
source_conf "$HESTIA/conf/hestia.conf"
|
|
|
|
#----------------------------------------------------------#
|
|
# Verifications #
|
|
#----------------------------------------------------------#
|
|
|
|
check_args '2' "$#" 'IP CHAIN'
|
|
is_format_valid 'ip' 'chain'
|
|
is_system_enabled "$FIREWALL_SYSTEM" 'FIREWALL_SYSTEM'
|
|
|
|
# Perform verification if read-only mode is enabled
|
|
check_hestia_demo_mode
|
|
|
|
#----------------------------------------------------------#
|
|
# Action #
|
|
#----------------------------------------------------------#
|
|
|
|
# Self heal iptables links
|
|
heal_iptables_links
|
|
|
|
conf="$HESTIA/data/firewall/banlist.conf"
|
|
if [ "$chain" == "ALL" ]; then
|
|
check_ip=$(grep "IP='$ip' CHAIN='*'" $conf)
|
|
if [ -z "$check_ip" ]; then
|
|
exit
|
|
fi
|
|
grep "IP='$ip' CHAIN='*'" $conf | while read -r line; do
|
|
parse_object_kv_list $line
|
|
|
|
# Deleting ip from banlist
|
|
sip=$(echo "$IP" | sed "s|/|\\\/|g")
|
|
sed -i "/IP='$sip' CHAIN='$CHAIN'/d" $conf
|
|
b=$($iptables -L fail2ban-$CHAIN --line-number -n | grep -w $ip | awk '{print $1}')
|
|
$iptables -D fail2ban-$CHAIN $b 2> /dev/null
|
|
done
|
|
else
|
|
# Checking ip in banlist
|
|
check_ip=$(grep "IP='$ip' CHAIN='$chain'" $conf 2> /dev/null)
|
|
if [ -z "$check_ip" ]; then
|
|
exit
|
|
fi
|
|
|
|
# Deleting ip from banlist
|
|
sip=$(echo "$ip" | sed "s|/|\\\/|g")
|
|
sed -i "/IP='$sip' CHAIN='$chain'/d" $conf
|
|
b=$($iptables -L fail2ban-$chain --line-number -n | grep -w $ip | awk '{print $1}')
|
|
$iptables -D fail2ban-$chain $b 2> /dev/null
|
|
fi
|
|
|
|
# Changing permissions
|
|
chmod 660 $conf
|
|
|
|
#----------------------------------------------------------#
|
|
# Hestia #
|
|
#----------------------------------------------------------#
|
|
|
|
# Logging
|
|
$BIN/v-log-action "system" "Info" "Firewall" "Removed IP from ban list (IP: $ip, Service: $chain)."
|
|
log_event "$OK" "$ARGUMENTS"
|
|
|
|
exit
|