summaryrefslogtreecommitdiff
path: root/scripts
diff options
context:
space:
mode:
authorAn-Cheng Huang <ancheng@vyatta.com>2011-05-03 17:28:08 +0800
committerAn-Cheng Huang <ancheng@vyatta.com>2011-05-03 17:28:08 +0800
commit22d37f427054b52bd724c17d9656bca6dee7d3c5 (patch)
tree656383e504a44572561e93a93898f31409886423 /scripts
parent6ce1a694e899ee9b99fd3ab55a6a156b6d76b91b (diff)
downloadvyatta-cfg-firewall-22d37f427054b52bd724c17d9656bca6dee7d3c5.tar.gz
vyatta-cfg-firewall-22d37f427054b52bd724c17d9656bca6dee7d3c5.zip
modify firewall groups to work with new commitnapa-dev
Diffstat (limited to 'scripts')
-rwxr-xr-xscripts/firewall/vyatta-ipset.pl72
1 files changed, 63 insertions, 9 deletions
diff --git a/scripts/firewall/vyatta-ipset.pl b/scripts/firewall/vyatta-ipset.pl
index 18bd270..7ee7bdc 100755
--- a/scripts/firewall/vyatta-ipset.pl
+++ b/scripts/firewall/vyatta-ipset.pl
@@ -31,6 +31,7 @@ use Vyatta::Config;
use Vyatta::TypeChecker;
use Vyatta::Misc;
use Vyatta::IpTables::IpSet;
+use Sort::Versions;
use warnings;
use strict;
@@ -82,13 +83,9 @@ sub ipset_check_set_type {
die "Error: undefined set_name\n" if ! defined $set_name;
die "Error: undefined set_type\n" if ! defined $set_type;
- my $group = new Vyatta::IpTables::IpSet($set_name);
- return "Group [$set_name] has not been defined\n" if ! $group->exists();
- my $type = $group->get_type();
- $type = 'undefined' if ! defined $type;
- if ($type ne $set_type) {
- return "Error: group [$set_name] is of type [$type] not [$set_type]\n";
- }
+ my $cfg = new Vyatta::Config;
+ return "Group [$set_name] has not been defined\n"
+ if (!$cfg->exists("firewall group $set_type-group $set_name"));
return;
}
@@ -127,12 +124,16 @@ sub ipset_is_set_empty {
sub ipset_show_sets {
my @lines = `ipset -L`;
+ my @sets = ();
foreach my $line (@lines) {
if ($line =~ /^Name:\s+(\S+)$/ ) {
- ipset_show_members($1);
- print "\n";
+ push @sets, $1;
}
}
+ foreach my $set (sort { versioncmp($b, $a) } (@sets)) {
+ ipset_show_members($set);
+ print "\n";
+ }
return;
}
@@ -199,6 +200,56 @@ sub ipset_is_group_used {
exit 1;
}
+sub update_set {
+ my ($set_name, $set_type) = @_;
+ my $cfg = new Vyatta::Config;
+ my $rc;
+ my $cpath = "firewall group $set_type-group $set_name";
+ if ($cfg->existsOrig($cpath)) {
+ if (!$cfg->exists($cpath)) {
+ # deleted
+ return $rc if (($rc = ipset_delete($set_name)));
+ return;
+ }
+ } else {
+ if ($cfg->exists($cpath)) {
+ # added
+ return $rc if (($rc = ipset_create($set_name, $set_type)));
+ } else {
+ # doesn't exist! should not happen
+ return "Updating non-existent group [$set_name]";
+ }
+
+ }
+ # added or potentially changed => iterate members
+ my @ovals = $cfg->returnOrigValues("$cpath $set_type");
+ my @nvals = $cfg->returnValues("$cpath $set_type");
+ my %vals = $cfg->compareValueLists(\@ovals, \@nvals);
+ for my $d (@{$vals{deleted}}) {
+ return $rc if (($rc = ipset_delete_member($set_name, $d)));
+ }
+ for my $a (@{$vals{added}}) {
+ return $rc if (($rc = ipset_add_member($set_name, $a)));
+ }
+ exit 0;
+}
+
+sub prune_deleted_sets {
+ my $cfg = new Vyatta::Config;
+ my @set_types = keys(%Vyatta::IpTables::IpSet::grouptype_hash);
+ foreach my $set_type (@set_types) {
+ $cfg->setLevel("firewall group $set_type-group");
+ my %groups = $cfg->listNodeStatus();
+ next if (scalar(keys(%groups)) < 1);
+ foreach my $g (keys(%groups)) {
+ next if ($groups{$g} ne 'deleted');
+ next if ($cfg->isEffective($g)); # don't prune if delete failed
+ my $rc;
+ return $rc if (($rc = ipset_delete($g)));
+ }
+ }
+ exit 0;
+}
#
# main
@@ -242,6 +293,9 @@ $rc = ipset_is_group_deleted($set_name, $set_type)
$rc = ipset_is_group_used($set_name, $set_type) if $action eq 'is-group-used';
+$rc = update_set($set_name, $set_type) if $action eq 'update-set';
+$rc = prune_deleted_sets() if $action eq 'prune-deleted-sets';
+
if (defined $rc) {
print $rc;
exit 1;