summaryrefslogtreecommitdiff
path: root/src/migration-scripts/firewall/16-to-17
blob: 9ad7a30f822b216d139232b38a114a55b132931b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
# Copyright (C) 2024 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

#
# T4694: Adding rt ipsec exists/missing match to firewall configs.
# This involves a syntax change for IPsec matches, reflecting that different 
# nftables expressions are required depending on whether we're matching a 
# decrypted packet or a packet that will be encrypted - it's directional. 
# The old rules only matched decrypted packets, those matches are now *-in:
    # from: set firewall <family> <chainspec> rule <rule#> ipsec match-ipsec|match-none
    #   to: set firewall <family> <chainspec> rule <rule#> ipsec match-ipsec-in|match-none-in
#
# The <chainspec> positions this match allowed were:
# name (any custom chains), forward filter, input filter, prerouting raw.
# There are positions where it was possible to set, but it would never commit 
# (nftables rejects 'meta ipsec' in output hooks), they are not considered here.
#

import sys

from vyos.configtree import ConfigTree

firewall_base = ['firewall']

def migrate_chain(config: ConfigTree, path: list[str]) -> None:
    for rule_num in config.list_nodes(path + ['rule']):
        tmp_path = path + ['rule', rule_num, 'ipsec']
        if config.exists(tmp_path + ['match-ipsec']):
            config.delete(tmp_path + ['match-ipsec'])
            config.set(tmp_path + ['match-ipsec-in'])
        elif config.exists(tmp_path + ['match-none']):
            config.delete(tmp_path + ['match-none'])
            config.set(tmp_path + ['match-none-in'])

def migrate(config: ConfigTree) -> None:
    if not config.exists(firewall_base):
        # Nothing to do
        return

    for family in ['ipv4', 'ipv6']:
        tmp_path = firewall_base + [family, 'name']
        if config.exists(tmp_path):
            for custom_fwname in config.list_nodes(tmp_path):
                migrate_chain(config, tmp_path + [custom_fwname])

        for base_hook in [['forward', 'filter'], ['input', 'filter'], ['prerouting', 'raw']]:
            tmp_path = firewall_base + [family] + base_hook
            if config.exists(tmp_path):
                migrate_chain(config, tmp_path)