mirror of
https://github.com/lucaspalomodevelop/core.git
synced 2026-03-20 03:16:12 +00:00
firewall, nat. work in progress for https://github.com/opnsense/core/issues/1326
This commit is contained in:
parent
d3f245b646
commit
980915871c
171
src/opnsense/mvc/app/library/OPNsense/Firewall/NatRule.php
Normal file
171
src/opnsense/mvc/app/library/OPNsense/Firewall/NatRule.php
Normal file
@ -0,0 +1,171 @@
|
||||
<?php
|
||||
|
||||
/**
|
||||
* Copyright (C) 2017 Deciso B.V.
|
||||
*
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright notice,
|
||||
* this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
||||
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
|
||||
* AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
||||
* AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
|
||||
* OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||||
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||
* POSSIBILITY OF SUCH DAMAGE.
|
||||
*
|
||||
*/
|
||||
namespace OPNsense\Firewall;
|
||||
|
||||
/**
|
||||
* Class NatRule
|
||||
* @package OPNsense\Firewall
|
||||
*/
|
||||
class NatRule extends Rule
|
||||
{
|
||||
private $procorder_rdr = array(
|
||||
'disabled' => 'parseIsComment',
|
||||
'rdr' => 'parseBool,no rdr,rdr',
|
||||
'pass' => 'parseBool,pass ',
|
||||
'interface' => 'parseInterface',
|
||||
'ipprotocol' => 'parsePlain',
|
||||
'protocol' => 'parseReplaceSimple,tcp/udp:{tcp udp},proto ',
|
||||
'from' => 'parsePlainCurly,from ',
|
||||
'from_port' => 'parsePlainCurly, port ',
|
||||
'to' => 'parsePlainCurly,to ',
|
||||
'to_port' => 'parsePlainCurly, port ',
|
||||
'tag' => 'parsePlain, tag ',
|
||||
'tagged' => 'parsePlain, tagged ',
|
||||
'target' => 'parsePlain, -> ',
|
||||
'localport' => 'parsePlain, port ',
|
||||
'poolopts' => 'parsePlain'
|
||||
);
|
||||
|
||||
/**
|
||||
* output parsing
|
||||
* @param string $value field value
|
||||
* @return string
|
||||
*/
|
||||
protected function parseIsComment($value)
|
||||
{
|
||||
return !empty($value) ? "#" : "";
|
||||
}
|
||||
|
||||
/**
|
||||
* search interfaces without a gateway other then the one provided
|
||||
* @param $interface
|
||||
* @return list of interfaces
|
||||
*/
|
||||
private function reflectionInterfaces($interface)
|
||||
{
|
||||
$result = array();
|
||||
foreach ($this->interfaceMapping as $intfk => $intf) {
|
||||
if (empty($intf['gateway']) && empty($intf['gatewayv6']) && $interface != $intfk
|
||||
&& !in_array($intf['if'], $result)) {
|
||||
$result[] = $intf['if'];
|
||||
}
|
||||
}
|
||||
return $result;
|
||||
}
|
||||
|
||||
/**
|
||||
* preprocess internal rule data to detail level of actual ruleset
|
||||
* handles shortcuts, like inet46 and multiple interfaces
|
||||
* @return array
|
||||
*/
|
||||
private function fetchActualRules()
|
||||
{
|
||||
$result = array();
|
||||
$result = array();
|
||||
$interfaces = empty($this->rule['interface']) ? array(null) : explode(',', $this->rule['interface']);
|
||||
foreach ($interfaces as $interface) {
|
||||
if (isset($this->rule['ipprotocol']) && $this->rule['ipprotocol'] == 'inet46') {
|
||||
$ipprotos = array('inet', 'inet6');
|
||||
} elseif (isset($this->rule['ipprotocol'])) {
|
||||
$ipprotos = array($this->rule['ipprotocol']);
|
||||
} else {
|
||||
$ipprotos = array(null);
|
||||
}
|
||||
|
||||
foreach ($ipprotos as $ipproto) {
|
||||
$tmp = $this->rule;
|
||||
$tmp['rdr'] = !empty($tmp['nordr']);
|
||||
if (!empty($tmp['associated-rule-id']) && $tmp['associated-rule-id'] == "pass") {
|
||||
$tmp['pass'] = empty($tmp['nordr']);
|
||||
}
|
||||
$tmp['interface'] = $interface;
|
||||
$tmp['ipprotocol'] = $ipproto;
|
||||
$this->convertAddress($tmp);
|
||||
// target address, when invalid, disable rule
|
||||
if (!empty($tmp['target'])) {
|
||||
if (Util::isAlias($tmp['target'])) {
|
||||
$tmp['target'] = "\${$tmp['target']}";
|
||||
} elseif (!Util::isIpAddress($tmp['target']) && !Util::isSubnet($tmp['target'])) {
|
||||
$tmp['disabled'] = true;
|
||||
}
|
||||
}
|
||||
// parse our local port
|
||||
if (!empty($tmp['local-port']) && !empty($tmp['protocol'])
|
||||
&& in_array($tmp['protocol'], array('tcp/udp', 'udp', 'tcp'))) {
|
||||
if (Util::isAlias($tmp['local-port'])) {
|
||||
// We will keep this for backwards compatibility, although the alias use is very confusing.
|
||||
// Because the target can only be one address or range, we will just use the first one found
|
||||
// in the alias.... confusing.
|
||||
$tmp_port = Util::getPortAlias($tmp['local-port']);
|
||||
if (!empty($tmp_port)) {
|
||||
$tmp['localport'] = $tmp_port[0];
|
||||
}
|
||||
} elseif (Util::isPort($tmp['local-port'])) {
|
||||
$tmp['localport'] = $tmp['local-port'];
|
||||
} else {
|
||||
$tmp['disabled'] = true;
|
||||
}
|
||||
}
|
||||
|
||||
// disable rule when interface not found
|
||||
if (!empty($interface) && empty($this->interfaceMapping[$interface]['if'])) {
|
||||
$tmp['disabled'] = true;
|
||||
}
|
||||
$result[] = $tmp;
|
||||
// print_r($this->interfaceMapping[$interface]);
|
||||
// print_r($this->reflectionInterfaces($interface));
|
||||
}
|
||||
}
|
||||
return $result;
|
||||
}
|
||||
|
||||
/**
|
||||
* output rule as string
|
||||
* @return string ruleset
|
||||
*/
|
||||
public function __toString()
|
||||
{
|
||||
$ruleTxt = '';
|
||||
foreach ($this->fetchActualRules() as $rule) {
|
||||
foreach ($this->procorder_rdr as $tag => $handle) {
|
||||
$tmp = explode(',', $handle);
|
||||
$method = $tmp[0];
|
||||
$args = array(isset($rule[$tag]) ? $rule[$tag] : null);
|
||||
if (count($tmp) > 1) {
|
||||
array_shift($tmp);
|
||||
$args = array_merge($args, $tmp);
|
||||
}
|
||||
$ruleTxt .= call_user_func_array(array($this,$method), $args);
|
||||
}
|
||||
$ruleTxt .= "\n";
|
||||
}
|
||||
return $ruleTxt;
|
||||
}
|
||||
}
|
||||
@ -39,6 +39,7 @@ class Plugin
|
||||
{
|
||||
private $anchors = array();
|
||||
private $filterRules = array();
|
||||
private $natRules = array();
|
||||
private $interfaceMapping = array();
|
||||
private $gatewayMapping = array();
|
||||
private $systemDefaults = array();
|
||||
@ -218,6 +219,20 @@ class Plugin
|
||||
$this->filterRules[$prio][] = $rule;
|
||||
}
|
||||
|
||||
/**
|
||||
* register a Nat rule
|
||||
* @param int $prio priority
|
||||
* @param array $conf configuration
|
||||
*/
|
||||
public function registerNatRule($prio, $conf)
|
||||
{
|
||||
$rule = new NatRule($this->interfaceMapping, $conf);
|
||||
if (empty($this->natRules[$prio])) {
|
||||
$this->natRules[$prio] = array();
|
||||
}
|
||||
$this->natRules[$prio][] = $rule;
|
||||
}
|
||||
|
||||
/**
|
||||
* filter rules to text
|
||||
* @return string
|
||||
@ -234,6 +249,21 @@ class Plugin
|
||||
return $output;
|
||||
}
|
||||
|
||||
/**
|
||||
* filter rules to text
|
||||
* @return string
|
||||
*/
|
||||
public function outputNatRules()
|
||||
{
|
||||
$output = "";
|
||||
ksort($this->natRules);
|
||||
foreach ($this->natRules as $prio => $ruleset) {
|
||||
foreach ($ruleset as $rule) {
|
||||
$output .= (string)$rule;
|
||||
}
|
||||
}
|
||||
return $output;
|
||||
}
|
||||
/**
|
||||
* register a pf table
|
||||
* @param string $name table name
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user