diff options
author | Christian Breunig <christian@breunig.cc> | 2023-11-06 17:41:14 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2023-11-06 17:41:14 +0100 |
commit | 148ab6c4382be62c1021ec49e3262de66d38ab0a (patch) | |
tree | 10e14a0dd798b7503c68e680de1e6478ef58df44 | |
parent | fd9e2c24e739fd327f860c45fa00241fd1acca7e (diff) | |
parent | 42f5ae2e7e729e78157c24893b984ef30bd0498d (diff) | |
download | vyos-1x-148ab6c4382be62c1021ec49e3262de66d38ab0a.tar.gz vyos-1x-148ab6c4382be62c1021ec49e3262de66d38ab0a.zip |
Merge pull request #2441 from nicolas-fort/T5541-fix-zbf-sagiita
T5541: firewall: fix ZBF template and ruleset generation for local-zone rules
-rw-r--r-- | data/templates/firewall/nftables-zone.j2 | 4 | ||||
-rwxr-xr-x | src/conf_mode/firewall.py | 13 |
2 files changed, 15 insertions, 2 deletions
diff --git a/data/templates/firewall/nftables-zone.j2 b/data/templates/firewall/nftables-zone.j2 index 124304e77..ee468c6c1 100644 --- a/data/templates/firewall/nftables-zone.j2 +++ b/data/templates/firewall/nftables-zone.j2 @@ -39,8 +39,8 @@ } chain VZONE_{{ zone_name }}_OUT { oifname lo counter return -{% if zone_conf.from is vyos_defined %} -{% for from_zone, from_conf in zone_conf.from.items() if from_conf.firewall[fw_name] is vyos_defined %} +{% if zone_conf.from_local is vyos_defined %} +{% for from_zone, from_conf in zone_conf.from_local.items() if from_conf.firewall[fw_name] is vyos_defined %} oifname { {{ zone[from_zone].interface | join(",") }} } counter jump NAME{{ suffix }}_{{ from_conf.firewall[fw_name] }} oifname { {{ zone[from_zone].interface | join(",") }} } counter return {% endfor %} diff --git a/src/conf_mode/firewall.py b/src/conf_mode/firewall.py index c66b2a7ec..da22fad68 100755 --- a/src/conf_mode/firewall.py +++ b/src/conf_mode/firewall.py @@ -390,6 +390,19 @@ def generate(firewall): if not os.path.exists(nftables_conf): firewall['first_install'] = True + if 'zone' in firewall: + for local_zone, local_zone_conf in firewall['zone'].items(): + if 'local_zone' not in local_zone_conf: + continue + + local_zone_conf['from_local'] = {} + + for zone, zone_conf in firewall['zone'].items(): + if zone == local_zone or 'from' not in zone_conf: + continue + if local_zone in zone_conf['from']: + local_zone_conf['from_local'][zone] = zone_conf['from'][local_zone] + # Determine if conntrack is needed firewall['ipv4_conntrack_action'] = 'return' firewall['ipv6_conntrack_action'] = 'return' |