diff options
author | Michael Mair-Keimberger <mmk@levelnine.at> | 2022-10-01 14:17:59 +0200 |
---|---|---|
committer | Conrad Kostecki <conikost@gentoo.org> | 2022-10-02 16:42:39 +0200 |
commit | b2f817cba647957defa7ff0f2add91db0f5bc252 (patch) | |
tree | 5103fa1f571434c746350427e14af8237aacd463 | |
parent | media-sound/mpd: remove unused patch (diff) | |
download | gentoo-b2f817cba647957defa7ff0f2add91db0f5bc252.tar.gz gentoo-b2f817cba647957defa7ff0f2add91db0f5bc252.tar.bz2 gentoo-b2f817cba647957defa7ff0f2add91db0f5bc252.zip |
net-firewall/iptables: remove unused file
Signed-off-by: Michael Mair-Keimberger <mmk@levelnine.at>
Closes: https://github.com/gentoo/gentoo/pull/27559
Signed-off-by: Conrad Kostecki <conikost@gentoo.org>
-rw-r--r-- | net-firewall/iptables/files/iptables-r2.init | 165 |
1 files changed, 0 insertions, 165 deletions
diff --git a/net-firewall/iptables/files/iptables-r2.init b/net-firewall/iptables/files/iptables-r2.init deleted file mode 100644 index 3dcabb0dfb41..000000000000 --- a/net-firewall/iptables/files/iptables-r2.init +++ /dev/null @@ -1,165 +0,0 @@ -#!/sbin/openrc-run -# Copyright 1999-2018 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -extra_commands="check save panic" -extra_started_commands="reload" - -iptables_lock_wait_time=${IPTABLES_LOCK_WAIT_TIME:-"60"} -iptables_lock_wait_interval=${IPTABLES_LOCK_WAIT_INTERVAL:-"1000"} - -iptables_name=${SVCNAME} -case ${iptables_name} in - iptables|ip6tables) ;; - *) iptables_name="iptables" ;; -esac - -iptables_bin="/sbin/${iptables_name}" -case ${iptables_name} in - iptables) iptables_proc="/proc/net/ip_tables_names" - iptables_save=${IPTABLES_SAVE};; - ip6tables) iptables_proc="/proc/net/ip6_tables_names" - iptables_save=${IP6TABLES_SAVE};; -esac - -depend() { - need localmount #434774 - before net -} - -set_table_policy() { - local has_errors=0 chains table=$1 policy=$2 - case ${table} in - nat) chains="PREROUTING POSTROUTING OUTPUT";; - mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";; - filter) chains="INPUT FORWARD OUTPUT";; - *) chains="";; - esac - - local chain - for chain in ${chains} ; do - ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -t ${table} -P ${chain} ${policy} - [ $? -ne 0 ] && has_errors=1 - done - - return ${has_errors} -} - -checkkernel() { - if [ ! -e ${iptables_proc} ] ; then - eerror "Your kernel lacks ${iptables_name} support, please load" - eerror "appropriate modules and try again." - return 1 - fi - return 0 -} - -checkconfig() { - if [ -z "${iptables_save}" -o ! -f "${iptables_save}" ] ; then - eerror "Not starting ${iptables_name}. First create some rules then run:" - eerror "/etc/init.d/${iptables_name} save" - return 1 - fi - return 0 -} - -start_pre() { - checkconfig || return 1 -} - -start() { - ebegin "Loading ${iptables_name} state and starting firewall" - ${iptables_bin}-restore --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} ${SAVE_RESTORE_OPTIONS} < "${iptables_save}" - eend $? -} - -stop_pre() { - checkkernel || return 1 -} - -stop() { - if [ "${SAVE_ON_STOP}" = "yes" ] ; then - save || return 1 - fi - - ebegin "Stopping firewall" - local has_errors=0 a - for a in $(cat ${iptables_proc}) ; do - set_table_policy $a ACCEPT - [ $? -ne 0 ] && has_errors=1 - - ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a - [ $? -ne 0 ] && has_errors=1 - - ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a - [ $? -ne 0 ] && has_errors=1 - done - eend ${has_errors} -} - -reload() { - checkkernel || return 1 - checkrules || return 1 - ebegin "Flushing firewall" - local has_errors=0 a - for a in $(cat ${iptables_proc}) ; do - ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a - [ $? -ne 0 ] && has_errors=1 - - ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a - [ $? -ne 0 ] && has_errors=1 - done - eend ${has_errors} - - start -} - -checkrules() { - ebegin "Checking rules" - ${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < "${iptables_save}" - eend $? -} - -check() { - # Short name for users of init.d script. - checkrules -} - -save() { - ebegin "Saving ${iptables_name} state" - checkpath -q -d "$(dirname "${iptables_save}")" - checkpath -q -m 0600 -f "${iptables_save}" - ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}" - eend $? -} - -panic() { - # use iptables autoload capability to load at least all required - # modules and filter table - ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -S >/dev/null - if [ $? -ne 0 ] ; then - eerror "${iptables_bin} failed to load" - return 1 - fi - - if service_started ${iptables_name}; then - rc-service ${iptables_name} stop - fi - - local has_errors=0 a - ebegin "Dropping all packets" - for a in $(cat ${iptables_proc}) ; do - ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a - [ $? -ne 0 ] && has_errors=1 - - ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a - [ $? -ne 0 ] && has_errors=1 - - if [ "${a}" != "nat" ]; then - # The "nat" table is not intended for filtering, the use of DROP is therefore inhibited. - set_table_policy $a DROP - [ $? -ne 0 ] && has_errors=1 - fi - done - eend ${has_errors} -} |