-{% let flowtable_devices = fw4.resolve_offload_devices(); -%}
+{%
+ let flowtable_devices = fw4.resolve_offload_devices();
+ let available_helpers = filter(fw4.helpers(), h => h.available);
+ let defined_ipsets = fw4.ipsets();
+-%}
table inet fw4
flush table inet fw4
{% if (fw4.check_flowtable()): %}
delete flowtable inet fw4 ft
{% endif %}
+{% fw4.includes('ruleset-prepend') %}
table inet fw4 {
{% if (length(flowtable_devices) > 0): %}
{% endif %}
}
+
+{% endif %}
+{% if (length(available_helpers)): %}
+ #
+ # CT helper definitions
+ #
+
+{% for (let helper in available_helpers): %}
+{% for (let proto in helper.proto): %}
+ ct helper {{ helper.name }} {
+ type {{ fw4.quote(helper.name, true) }} protocol {{ proto.name }};
+ }
+
+{% endfor %}
+{% endfor %}
+
{% endif %}
+{% if (length(defined_ipsets)): %}
#
# Set definitions
#
-{% for (let set in fw4.ipsets()): %}
+{% for (let set in defined_ipsets): %}
set {{ set.name }} {
type {{ fw4.concat(set.types) }}
-{% if (set.maxelem > 0): %}
+{% if (set.maxelem > 0): %}
size {{ set.maxelem }}
-{% endif %}
-{% if (set.timeout >= 0): %}
+{% endif %}
+{% if (set.timeout > 0): %}
timeout {{ set.timeout }}s
-{% endif %}
-{% if (set.interval): %}
- flags interval
+{% endif %}
+{% if (set.interval): %}
auto-merge
-{% endif %}
-{% fw4.print_setentries(set) %}
+{% endif %}
+{% if (set.flags): %}
+ flags {{ join(',', set.flags) }}
+{% endif %}
+{% fw4.print_setentries(set) %}
}
-{% endfor %}
+{% endfor %}
+{% endif %}
#
# Defines
#
{% for (let zone in fw4.zones()): %}
-{% if (length(zone.match_devices)): %}
- define {{ zone.name }}_devices = {{ fw4.set(zone.match_devices, true) }}
-{% endif %}
-{% if (length(zone.match_subnets)): %}
- define {{ zone.name }}_subnets = {{ fw4.set(zone.match_subnets, true) }}
-{% endif %}
+ define {{ replace(zone.name, /^[0-9]/, '_$&') }}_devices = {{ fw4.set(zone.match_devices, true) }}
+ define {{ replace(zone.name, /^[0-9]/, '_$&') }}_subnets = {{ fw4.set(zone.match_subnets, true) }}
+
{% endfor %}
#
#
include "/etc/nftables.d/*.nft"
+{% fw4.includes('table-prepend') %}
#
iifname "lo" accept comment "!fw4: Accept traffic from loopback"
+{% fw4.includes('chain-prepend', 'input') %}
ct state established,related accept comment "!fw4: Allow inbound established and related flows"
{% if (fw4.default_option("drop_invalid")): %}
ct state invalid drop comment "!fw4: Drop flows with invalid conntrack state"
{% if (fw4.input_policy() == "reject"): %}
jump handle_reject
{% endif %}
+{% fw4.includes('chain-append', 'input') %}
}
chain forward {
{% if (length(flowtable_devices) > 0): %}
meta l4proto { tcp, udp } flow offload @ft;
{% endif %}
+{% fw4.includes('chain-prepend', 'forward') %}
ct state established,related accept comment "!fw4: Allow forwarded established and related flows"
{% if (fw4.default_option("drop_invalid")): %}
ct state invalid drop comment "!fw4: Drop flows with invalid conntrack state"
{% for (let zone in fw4.zones()): for (let rule in zone.match_rules): %}
{%+ include("zone-jump.uc", { fw4, zone, rule, direction: "forward" }) %}
{% endfor; endfor %}
+{% fw4.includes('chain-append', 'forward') %}
{% if (fw4.forward_policy() == "reject"): %}
jump handle_reject
{% endif %}
oifname "lo" accept comment "!fw4: Accept traffic towards loopback"
+{% fw4.includes('chain-prepend', 'output') %}
ct state established,related accept comment "!fw4: Allow outbound established and related flows"
{% if (fw4.default_option("drop_invalid")): %}
ct state invalid drop comment "!fw4: Drop flows with invalid conntrack state"
{% for (let rule in fw4.rules("output")): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
-{% for (let zone in fw4.zones()): for (let rule in zone.match_rules): %}
+{% for (let zone in fw4.zones()): %}
+{% for (let rule in zone.match_rules): %}
+{% if (zone.dflags.helper): %}
+{% let devices_pos = fw4.filter_loopback_devs(rule.devices_pos, true); %}
+{% let subnets_pos = fw4.filter_loopback_addrs(rule.subnets_pos, true); %}
+{% if (devices_pos || subnets_pos): %}
+ {%+ include("zone-jump.uc", { fw4, zone, rule: { ...rule, devices_pos, subnets_pos }, direction: "helper" }) %}
+{% endif %}
+{% endif %}
{%+ include("zone-jump.uc", { fw4, zone, rule, direction: "output" }) %}
-{% endfor; endfor %}
+{% endfor %}
+{% endfor %}
+{% fw4.includes('chain-append', 'output') %}
{% if (fw4.output_policy() == "reject"): %}
jump handle_reject
{% endif %}
}
+ chain prerouting {
+ type filter hook prerouting priority filter; policy accept;
+{% for (let zone in fw4.zones()): %}
+{% if (zone.dflags.helper): %}
+{% for (let rule in zone.match_rules): %}
+{% let devices_pos = fw4.filter_loopback_devs(rule.devices_pos, false); %}
+{% let subnets_pos = fw4.filter_loopback_addrs(rule.subnets_pos, false); %}
+{% if (rule.devices_neg || rule.subnets_neg || devices_pos || subnets_pos): %}
+ {%+ include("zone-jump.uc", { fw4, zone, rule: { ...rule, devices_pos, subnets_pos }, direction: "helper" }) %}
+{% endif %}
+{% endfor %}
+{% endif %}
+{% endfor %}
+ }
+
chain handle_reject {
meta l4proto tcp reject with {{
(fw4.default_option("tcp_reject_code") != "tcp-reset")
{% endif %}
{% for (let zone in fw4.zones()): %}
chain input_{{ zone.name }} {
+{% fw4.includes('chain-prepend', `input_${zone.name}`) %}
{% for (let rule in fw4.rules(`input_${zone.name}`)): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
{% if (zone.dflags.dnat): %}
ct status dnat accept comment "!fw4: Accept port redirections"
{% endif %}
+{% fw4.includes('chain-append', `input_${zone.name}`) %}
jump {{ zone.input }}_from_{{ zone.name }}
}
chain output_{{ zone.name }} {
+{% fw4.includes('chain-prepend', `output_${zone.name}`) %}
{% for (let rule in fw4.rules(`output_${zone.name}`)): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
+{% fw4.includes('chain-append', `output_${zone.name}`) %}
jump {{ zone.output }}_to_{{ zone.name }}
}
chain forward_{{ zone.name }} {
+{% fw4.includes('chain-prepend', `forward_${zone.name}`) %}
{% for (let rule in fw4.rules(`forward_${zone.name}`)): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
{% if (zone.dflags.dnat): %}
ct status dnat accept comment "!fw4: Accept port forwards"
{% endif %}
+{% fw4.includes('chain-append', `forward_${zone.name}`) %}
jump {{ zone.forward }}_to_{{ zone.name }}
+{% if (fw4.forward_policy() != "accept" && (zone.log & 1)): %}
+ log prefix "{{ fw4.forward_policy() }} {{ zone.name }} forward: "
+{% endif %}
}
+{% if (zone.dflags.helper): %}
+ chain helper_{{ zone.name }} {
+{% for (let rule in fw4.rules(`helper_${zone.name}`)): %}
+ {%+ include("rule.uc", { fw4, rule }) %}
+{% endfor %}
+ }
+
+{% endif %}
{% for (let verdict in ["accept", "reject", "drop"]): %}
{% if (zone.sflags[verdict]): %}
chain {{ verdict }}_from_{{ zone.name }} {
chain dstnat {
type nat hook prerouting priority dstnat; policy accept;
+{% fw4.includes('chain-prepend', 'dstnat') %}
{% for (let zone in fw4.zones()): %}
{% if (zone.dflags.dnat): %}
{% for (let rule in zone.match_rules): %}
{% endfor %}
{% endif %}
{% endfor %}
+{% fw4.includes('chain-append', 'dstnat') %}
}
chain srcnat {
type nat hook postrouting priority srcnat; policy accept;
+{% fw4.includes('chain-prepend', 'srcnat') %}
{% for (let redirect in fw4.redirects("srcnat")): %}
{%+ include("redirect.uc", { fw4, redirect }) %}
{% endfor %}
{% endfor %}
{% endif %}
{% endfor %}
+{% fw4.includes('chain-append', 'srcnat') %}
}
{% for (let zone in fw4.zones()): %}
{% if (zone.dflags.dnat): %}
chain dstnat_{{ zone.name }} {
+{% fw4.includes('chain-prepend', `dstnat_${zone.name}`) %}
{% for (let redirect in fw4.redirects(`dstnat_${zone.name}`)): %}
{%+ include("redirect.uc", { fw4, redirect }) %}
{% endfor %}
+{% fw4.includes('chain-append', `dstnat_${zone.name}`) %}
}
{% endif %}
{% if (zone.dflags.snat): %}
chain srcnat_{{ zone.name }} {
+{% fw4.includes('chain-prepend', `srcnat_${zone.name}`) %}
{% for (let redirect in fw4.redirects(`srcnat_${zone.name}`)): %}
{%+ include("redirect.uc", { fw4, redirect }) %}
{% endfor %}
{% endfor %}
{% endfor %}
{% endif %}
+{% fw4.includes('chain-append', `srcnat_${zone.name}`) %}
}
{% endif %}
{% endfor %}
#
- # Raw rules (notrack & helper)
+ # Raw rules (notrack)
#
chain raw_prerouting {
type filter hook prerouting priority raw; policy accept;
-{% for (let target in ["helper", "notrack"]): %}
-{% for (let zone in fw4.zones()): %}
-{% if (zone.dflags[target]): %}
-{% for (let rule in zone.match_rules): %}
-{% let devices_pos = fw4.filter_loopback_devs(rule.devices_pos, false); %}
-{% let subnets_pos = fw4.filter_loopback_addrs(rule.subnets_pos, false); %}
-{% if (rule.devices_neg || rule.subnets_neg || devices_pos || subnets_pos): %}
- {%+ if (rule.family): -%}
- meta nfproto {{ fw4.nfproto(rule.family) }} {%+ endif -%}
- {%+ include("zone-match.uc", { fw4, egress: false, rule: { ...rule, devices_pos, subnets_pos } }) -%}
- jump {{ target }}_{{ zone.name }} comment "!fw4: {{ zone.name }} {{ fw4.nfproto(rule.family, true) }} {{
- (target == "helper") ? "CT helper assignment" : "CT bypass"
- }}"
-{% endif %}
-{% endfor %}
-{% endif %}
-{% endfor %}
+{% for (let zone in fw4.zones()): %}
+{% if (zone.dflags["notrack"]): %}
+{% for (let rule in zone.match_rules): %}
+{% let devices_pos = fw4.filter_loopback_devs(rule.devices_pos, false); %}
+{% let subnets_pos = fw4.filter_loopback_addrs(rule.subnets_pos, false); %}
+{% if (rule.devices_neg || rule.subnets_neg || devices_pos || subnets_pos): %}
+ {%+ include("zone-jump.uc", { fw4, zone, rule: { ...rule, devices_pos, subnets_pos }, direction: "notrack" }) %}
+{% endif %}
+{% endfor %}
+{% endif %}
{% endfor %}
+{% fw4.includes('chain-append', 'raw_prerouting') %}
}
chain raw_output {
type filter hook output priority raw; policy accept;
-{% for (let target in ["helper", "notrack"]): %}
-{% for (let zone in fw4.zones()): %}
-{% if (zone.dflags[target]): %}
-{% for (let rule in zone.match_rules): %}
-{% let devices_pos = fw4.filter_loopback_devs(rule.devices_pos, true); %}
-{% let subnets_pos = fw4.filter_loopback_addrs(rule.subnets_pos, true); %}
-{% if (devices_pos || subnets_pos): %}
- {%+ if (rule.family): -%}
- meta nfproto {{ fw4.nfproto(rule.family) }} {%+ endif -%}
- {%+ include("zone-match.uc", { fw4, egress: false, rule: { ...rule, devices_pos, subnets_pos } }) -%}
- jump {{ target }}_{{ zone.name }} comment "!fw4: {{ zone.name }} {{ fw4.nfproto(rule.family, true) }} {{
- (target == "helper") ? "CT helper assignment" : "CT bypass"
- }}"
-{% endif %}
-{% endfor %}
-{% endif %}
-{% endfor %}
-{% endfor %}
- }
-
-{% for (let helper in fw4.helpers()): %}
-{% if (helper.available): %}
-{% for (let proto in helper.proto): %}
- ct helper {{ helper.name }} {
- type {{ fw4.quote(helper.name, true) }} protocol {{ proto.name }};
- }
-
+{% fw4.includes('chain-prepend', 'raw_output') %}
+{% for (let zone in fw4.zones()): %}
+{% if (zone.dflags["notrack"]): %}
+{% for (let rule in zone.match_rules): %}
+{% let devices_pos = fw4.filter_loopback_devs(rule.devices_pos, true); %}
+{% let subnets_pos = fw4.filter_loopback_addrs(rule.subnets_pos, true); %}
+{% if (devices_pos || subnets_pos): %}
+ {%+ include("zone-jump.uc", { fw4, zone, rule: { ...rule, devices_pos, subnets_pos }, direction: "notrack" }) %}
+{% endif %}
{% endfor %}
{% endif %}
{% endfor %}
-{% for (let target in ["helper", "notrack"]): %}
-{% for (let zone in fw4.zones()): %}
-{% if (zone.dflags[target]): %}
- chain {{ target }}_{{ zone.name }} {
-{% for (let rule in fw4.rules(`${target}_${zone.name}`)): %}
+{% fw4.includes('chain-append', 'raw_output') %}
+ }
+
+{% for (let zone in fw4.zones()): %}
+{% if (zone.dflags.notrack): %}
+ chain notrack_{{ zone.name }} {
+{% for (let rule in fw4.rules(`notrack_${zone.name}`)): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
}
{% endif %}
-{% endfor %}
{% endfor %}
#
chain mangle_prerouting {
type filter hook prerouting priority mangle; policy accept;
+{% fw4.includes('chain-prepend', 'mangle_prerouting') %}
{% for (let rule in fw4.rules("mangle_prerouting")): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
+{% fw4.includes('chain-append', 'mangle_prerouting') %}
}
chain mangle_postrouting {
type filter hook postrouting priority mangle; policy accept;
+{% fw4.includes('chain-prepend', 'mangle_postrouting') %}
{% for (let rule in fw4.rules("mangle_postrouting")): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
+{% fw4.includes('chain-append', 'mangle_postrouting') %}
}
chain mangle_input {
type filter hook input priority mangle; policy accept;
+{% fw4.includes('chain-prepend', 'mangle_input') %}
{% for (let rule in fw4.rules("mangle_input")): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
+{% fw4.includes('chain-append', 'mangle_input') %}
}
chain mangle_output {
- type filter hook output priority mangle; policy accept;
+ type route hook output priority mangle; policy accept;
+{% fw4.includes('chain-prepend', 'mangle_output') %}
{% for (let rule in fw4.rules("mangle_output")): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
+{% fw4.includes('chain-append', 'mangle_output') %}
}
chain mangle_forward {
type filter hook forward priority mangle; policy accept;
+{% fw4.includes('chain-prepend', 'mangle_forward') %}
{% for (let rule in fw4.rules("mangle_forward")): %}
{%+ include("rule.uc", { fw4, rule }) %}
{% endfor %}
{% endfor %}
{% endif %}
{% endfor %}
+{% fw4.includes('chain-append', 'mangle_forward') %}
}
+{% fw4.includes('table-append') %}
}
+{% fw4.includes('ruleset-append') %}