3 let fw4 = require("fw4");
5 function read_state() {
6 let state = fw4.read_state();
9 warn("Unable to read firewall state - do you need to start the firewall?\n");
16 function reload_sets() {
17 let state = read_state(),
18 sets = fw4.check_set_types();
20 for (let set in state.ipsets) {
21 if (!set.loadfile || !length(set.entries))
24 if (!exists(sets, set.name)) {
25 warn(`Named set '${set.name}' does not exist - do you need to restart the firewall?\n`);
28 else if (fw4.concat(sets[set.name]) != fw4.concat(set.types)) {
29 warn(`Named set '${set.name}' has a different type - want '${fw4.concat(set.types)}' but is '${fw4.concat(sets[set.name])}' - do you need to restart the firewall?\n`);
34 let printer = (entry) => {
36 print(`add element inet fw4 ${set.name} {\n`);
40 print(` ${join(" . ", entry)},\n`);
43 print(`flush set inet fw4 ${set.name}\n`);
45 map(set.entries, printer);
46 fw4.parse_setfile(set, printer);
53 function render_ruleset(use_statefile) {
54 fw4.load(use_statefile);
56 include("templates/ruleset.uc", { fw4, type, exists, length, include });
59 function lookup_network(net) {
60 let state = read_state();
62 for (let zone in state.zones) {
63 for (let network in (zone.network || [])) {
64 if (network.device == net) {
65 print(zone.name, "\n");
74 function lookup_device(dev) {
75 let state = read_state();
77 for (let zone in state.zones) {
78 for (let rule in (zone.match_rules || [])) {
79 if (dev in rule.devices_pos) {
80 print(zone.name, "\n");
89 function lookup_zone(name, dev) {
90 let state = read_state();
92 for (let zone in state.zones) {
93 if (zone.name == name) {
95 map(zone.match_rules, (r) => push(devices, ...(r.devices_pos || [])));
107 print(join("\n", devices), "\n");
117 switch (getenv("ACTION")) {
119 return render_ruleset(true);
122 return render_ruleset(false);
125 return reload_sets();
128 return lookup_network(getenv("OBJECT"));
131 return lookup_device(getenv("OBJECT"));
134 return lookup_zone(getenv("OBJECT"), getenv("DEVICE"));