You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1326 lines
52 KiB

  1. #!/bin/sh /etc/rc.common
  2. # Copyright 2017-2020 Stan Grishin (stangri@melmac.net)
  3. # shellcheck disable=SC2039,SC1091,SC2018,SC2019,SC3043,SC3057,SC3060
  4. PKG_VERSION='dev-test'
  5. # sysctl net.ipv4.conf.default.rp_filter=1
  6. # sysctl net.ipv4.conf.all.rp_filter=1
  7. # shellcheck disable=SC2034
  8. START=94
  9. # shellcheck disable=SC2034
  10. USE_PROCD=1
  11. if type extra_command 1>/dev/null 2>&1; then
  12. extra_command 'support' "Generates output required to troubleshoot routing issues
  13. Use '-d' option for more detailed output
  14. Use '-p' option to automatically upload data under VPR paste.ee account
  15. WARNING: while paste.ee uploads are unlisted, they are still publicly available
  16. List domain names after options to include their lookup in report"
  17. extra_command 'version' 'Show version information'
  18. extra_command 'reload_interface' 'Reload specific interface only'
  19. else
  20. # shellcheck disable=SC2034
  21. EXTRA_COMMANDS='reload_interface support version'
  22. # shellcheck disable=SC2034
  23. EXTRA_HELP=" support Generates output required to troubleshoot routing issues
  24. Use '-d' option for more detailed output
  25. Use '-p' option to automatically upload data under VPR paste.ee account
  26. WARNING: while paste.ee uploads are unlisted, they are still publicly available
  27. List domain names after options to include their lookup in report"
  28. fi
  29. readonly packageName='vpn-policy-routing'
  30. readonly serviceName="$packageName $PKG_VERSION"
  31. readonly PIDFile="/var/run/${packageName}.pid"
  32. readonly jsonFile="/var/run/${packageName}.json"
  33. readonly dnsmasqFile="/var/dnsmasq.d/${packageName}"
  34. readonly sharedMemoryOutput="/dev/shm/$packageName-output"
  35. readonly _OK_='\033[0;32m\xe2\x9c\x93\033[0m'
  36. readonly _FAIL_='\033[0;31m\xe2\x9c\x97\033[0m'
  37. readonly __OK__='\033[0;32m[\xe2\x9c\x93]\033[0m'
  38. readonly __FAIL__='\033[0;31m[\xe2\x9c\x97]\033[0m'
  39. readonly _ERROR_='\033[0;31mERROR\033[0m'
  40. readonly _WARNING_='\033[0;33mWARNING\033[0m'
  41. gatewaySummary=''; errorSummary=''; warningSummary='';
  42. serviceEnabled=''; verbosity=''; strictMode='';
  43. wanTableID=''; wanMark=''; fwMask='';
  44. ipv6Enabled=''; srcIpset=''; destIpset=''; resolverIpset='';
  45. wanIface4=''; wanIface6=''; ifaceMark=''; ifaceTableID='';
  46. ifAll=''; ifSupported=''; ignoredIfaces=''; supportedIfaces=''; icmpIface='';
  47. wanGW4=''; wanGW6=''; bootTimeout=''; insertOption='';
  48. webuiChainColumn=''; webuiShowIgnore=''; dnsmasqIpsetSupported='';
  49. procdReloadDelay=''; mainTableListing='';
  50. usedChainsList='PREROUTING'
  51. ipsetSupported='true'
  52. configLoaded='false'
  53. version() { echo "$PKG_VERSION"; }
  54. output_ok() { output 1 "$_OK_"; output 2 "$__OK__\\n"; }
  55. output_okn() { output 1 "$_OK_\\n"; output 2 "$__OK__\\n"; }
  56. output_fail() { s=1; output 1 "$_FAIL_"; output 2 "$__FAIL__\\n"; }
  57. output_failn() { output 1 "$_FAIL_\\n"; output 2 "$__FAIL__\\n"; }
  58. str_replace() { printf "%b" "$1" | sed -e "s/$(printf "%b" "$2")/$(printf "%b" "$3")/g"; }
  59. str_replace() { echo "${1//$2/$3}"; }
  60. str_contains() { [ -n "$2" ] && [ "${1//$2}" != "$1" ]; }
  61. str_contains_word() { echo "$1" | grep -q -w "$2"; }
  62. str_to_lower() { echo "$1" | tr 'A-Z' 'a-z'; }
  63. str_extras_to_underscore() { echo "$1" | tr '[\. ~`!@#$%^&*()\+/,<>?//;:]' '_'; }
  64. str_extras_to_space() { echo "$1" | tr ';{}' ' '; }
  65. output() {
  66. # Can take a single parameter (text) to be output at any verbosity
  67. # Or target verbosity level and text to be output at specifc verbosity
  68. local msg memmsg logmsg
  69. if [ "$#" -ne 1 ]; then
  70. if [ $((verbosity & $1)) -gt 0 ] || [ "$verbosity" = "$1" ]; then shift; else return 0; fi
  71. fi
  72. [ -t 1 ] && printf "%b" "$1"
  73. msg="${1//$serviceName /service }";
  74. if [ "$(printf "%b" "$msg" | wc -l)" -gt 0 ]; then
  75. [ -s "$sharedMemoryOutput" ] && memmsg="$(cat "$sharedMemoryOutput")"
  76. logmsg="$(printf "%b" "${memmsg}${msg}" | sed 's/\x1b\[[0-9;]*m//g')"
  77. logger -t "${packageName:-service} [$$]" "$(printf "%b" "$logmsg")"
  78. rm -f "$sharedMemoryOutput"
  79. else
  80. printf "%b" "$msg" >> "$sharedMemoryOutput"
  81. fi
  82. }
  83. is_present() { command -v "$1" >/dev/null 2>&1; }
  84. is_installed() { [ -s "/usr/lib/opkg/info/${1}.control" ]; }
  85. is_variant_installed() { [ "$(echo /usr/lib/opkg/info/"${1}"*.control)" != "/usr/lib/opkg/info/${1}*.control" ]; }
  86. build_ifAll() { ifAll="${ifAll}${1} "; }
  87. build_ifSupported() { is_supported_interface "$1" && ifSupported="${ifSupported}${1} "; }
  88. vpr_find_iface() {
  89. local iface i param="$2"
  90. [ "$param" = 'wan6' ] || param='wan'
  91. "network_find_${param}" iface
  92. is_tunnel "$iface" && unset iface
  93. if [ -z "$iface" ]; then
  94. for i in $ifAll; do
  95. if "is_${param}" "$i"; then break; else unset i; fi
  96. done
  97. fi
  98. eval "$1"='${iface:-$i}'
  99. }
  100. vpr_get_gateway() {
  101. local iface="$2" dev="$3" gw
  102. network_get_gateway gw "$iface"
  103. if [ -z "$gw" ] || [ "$gw" = '0.0.0.0' ]; then
  104. gw="$(ip -4 a list dev "$dev" 2>/dev/null | grep inet | awk '{print $2}' | awk -F "/" '{print $1}')"
  105. fi
  106. eval "$1"='$gw'
  107. }
  108. vpr_get_gateway6() {
  109. local iface="$2" dev="$3" gw
  110. network_get_gateway6 gw "$iface"
  111. if [ -z "$gw" ] || [ "$gw" = '::/0' ] || [ "$gw" = '::0/0' ] || [ "$gw" = '::' ]; then
  112. gw="$(ip -6 a list dev "$dev" 2>/dev/null | grep inet6 | awk '{print $2}')"
  113. fi
  114. eval "$1"='$gw'
  115. }
  116. is_l2tp() { local proto; proto=$(uci -q get network."$1".proto); [ "${proto:0:4}" = "l2tp" ]; }
  117. is_oc() { local proto; proto=$(uci -q get network."$1".proto); [ "${proto:0:11}" = "openconnect" ]; }
  118. is_ovpn() { local dev i; for i in ifname device; do [ -z "$dev" ] && dev="$(uci -q get "network.${1}.${i}")"; done; [ "${dev:0:3}" = "tun" ] || [ "${dev:0:3}" = "tap" ] || [ -f "/sys/devices/virtual/net/${dev}/tun_flags" ]; }
  119. is_pptp() { local proto; proto=$(uci -q get network."$1".proto); [ "${proto:0:4}" = "pptp" ]; }
  120. is_tor() { [ "$(str_to_lower "$1")" = "tor" ]; }
  121. is_tor_running() {
  122. local ret=0
  123. if [ -s "/etc/tor/torrc" ]; then
  124. json_load "$(ubus call service list "{ 'name': 'tor' }")"
  125. json_select 'tor'; json_select 'instances'; json_select 'instance1';
  126. json_get_var ret 'running'; json_cleanup
  127. fi
  128. if [ "$ret" = "0" ]; then return 1; else return 0; fi
  129. }
  130. is_wg() { local proto; proto=$(uci -q get network."$1".proto); [ "${proto:0:9}" = "wireguard" ]; }
  131. is_tunnel() { is_l2tp "$1" || is_oc "$1" || is_ovpn "$1" || is_pptp "$1" || is_tor "$1" || is_wg "$1"; }
  132. is_wan() { [ "$1" = "$wanIface4" ] || { [ "${1##wan}" != "$1" ] && [ "${1##wan6}" = "$1" ]; } || [ "${1%%wan}" != "$1" ]; }
  133. is_wan6() { [ -n "$wanIface6" ] && [ "$1" = "$wanIface6" ] || [ "${1/#wan6}" != "$1" ] || [ "${1/%wan6}" != "$1" ]; }
  134. is_ignored_interface() { str_contains_word "$ignoredIfaces" "$1"; }
  135. is_supported_interface() { str_contains_word "$supportedIfaces" "$1" || { ! is_ignored_interface "$1" && { is_wan "$1" || is_wan6 "$1" || is_tunnel "$1"; }; }; }
  136. is_mac_address() { expr "$1" : '[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]$' >/dev/null; }
  137. is_ipv4() { expr "$1" : '[0-9][0-9]*\.[0-9][0-9]*\.[0-9][0-9]*\.[0-9][0-9]*$' >/dev/null; }
  138. is_ipv6() { ! is_mac_address "$1" && str_contains "$1" ":"; }
  139. is_family_mismatch() { ( is_netmask "${1//!}" && is_ipv6 "${2//!}" ) || ( is_ipv6 "${1//!}" && is_netmask "${2//!}" ); }
  140. is_ipv6_link_local() { [ "${1:0:4}" = "fe80" ]; }
  141. is_ipv6_unique_local() { [ "${1:0:2}" = "fc" ] || [ "${1:0:2}" = "fd" ]; }
  142. is_ipv6_global() { [ "${1:0:4}" = "2001" ]; }
  143. # is_ipv6_global() { is_ipv6 "$1" && ! is_ipv6_link_local "$1" && ! is_ipv6_link_local "$1"; }
  144. is_netmask() { local ip="${1%/*}"; [ "$ip" != "$1" ] && is_ipv4 "$ip"; }
  145. is_domain() { str_contains "$1" '[a-zA-Z]'; }
  146. is_phys_dev() { [ "${1:0:1}" = "@" ] && ip l show | grep -E -q "^\\d+\\W+${1:1}"; }
  147. is_turris() { /bin/ubus -S call system board | /bin/grep 'Turris' | /bin/grep -q '15.05'; }
  148. is_chaos_calmer() { ubus -S call system board | grep -q 'Chaos Calmer'; }
  149. dnsmasq_kill() { killall -q -HUP dnsmasq; }
  150. dnsmasq_restart() { output 3 'Restarting DNSMASQ '; if /etc/init.d/dnsmasq restart >/dev/null 2>&1; then output_okn; else output_failn; fi; }
  151. is_default_dev() { [ "$1" = "$(ip -4 r | grep -m1 'dev' | grep -Eso 'dev [^ ]*' | awk '{print $2}')" ]; }
  152. is_supported_iface_dev() {
  153. local n
  154. for n in $ifSupported; do
  155. if [ "$1" = "$(uci -q get "network.${n}.ifname" || echo "$n")" ] || \
  156. [ "$1" = "$(uci -q get "network.${n}.device" || echo "$n")" ] || \
  157. [ "$1" = "$(uci -q get "network.${n}.proto")-${n}" ] ; then return 0; fi
  158. done
  159. return 1
  160. }
  161. is_supported_protocol() { grep -o '^[^#]*' /etc/protocols | grep -w -v '0' | grep . | awk '{print $1}' | grep -q "$1"; }
  162. append_chains_targets() {
  163. local chain iface name
  164. config_get name "$1" 'name' 'blank'
  165. config_get chain "$1" 'chain' 'PREROUTING'
  166. config_get iface "$1" 'interface'
  167. if ! str_contains_word "$usedChainsList" "$chain"; then
  168. usedChainsList="$usedChainsList $chain"
  169. if [ "$chain" != 'PREROUTING' ] && [ "$webuiChainColumn" != '1' ]; then
  170. warningSummary="${warningSummary}$_WARNING_: Chain '$chain' is used by a policy '$name', but a WebUI setting to show chains column (webui_chain_column) is disabled!\\n"
  171. fi
  172. fi
  173. if [ "$iface" = 'ignore' ] && ! str_contains_word "$supportedIfaces" 'ignore'; then
  174. supportedIfaces="$supportedIfaces ignore"
  175. if [ "$webuiShowIgnore" != '1' ]; then
  176. warningSummary="${warningSummary}$_WARNING_: The 'ignore' target is used by a policy '$name', but a WebUI setting to show 'ignore' target (webui_show_ignore_target) is disabled!\\n"
  177. fi
  178. fi
  179. }
  180. load_package_config() {
  181. [ "$configLoaded" = 'false' ] || return 0
  182. config_load "$packageName"
  183. config_get_bool serviceEnabled 'config' 'enabled' 0
  184. config_get_bool strictMode 'config' 'strict_enforcement' 1
  185. config_get_bool ipv6Enabled 'config' 'ipv6_enabled' 0
  186. config_get_bool srcIpset 'config' 'src_ipset' 0
  187. config_get_bool destIpset 'config' 'dest_ipset' 0
  188. config_get_bool mainTableListing 'config' 'quick_table_create' 0
  189. config_get resolverIpset 'config' 'resolver_ipset' 'dnsmasq.ipset'
  190. config_get verbosity 'config' 'verbosity' '2'
  191. config_get wanTableID 'config' 'wan_tid' '201'
  192. config_get wanMark 'config' 'wan_mark' '0x010000'
  193. config_get fwMask 'config' 'fw_mask' '0xff0000'
  194. config_get icmpIface 'config' 'icmp_interface'
  195. config_get ignoredIfaces 'config' 'ignored_interface'
  196. config_get supportedIfaces 'config' 'supported_interface'
  197. config_get bootTimeout 'config' 'boot_timeout' '30'
  198. config_get insertOption 'config' 'iptables_rule_option' 'append'
  199. config_get procdReloadDelay 'config' 'procd_reload_delay' '0'
  200. config_get_bool webuiChainColumn 'config' 'webui_chain_column' '0'
  201. config_get_bool webuiShowIgnore 'config' 'webui_show_ignore_target' '0'
  202. config_foreach append_chains_targets 'policy'
  203. if [ -z "${verbosity##*[!0-9]*}" ] || [ "$verbosity" -lt 0 ] || [ "$verbosity" -gt 2 ]; then
  204. verbosity=2
  205. fi
  206. . /lib/functions/network.sh
  207. . /usr/share/libubox/jshn.sh
  208. mkdir -p "${PIDFile%/*}"
  209. mkdir -p "${jsonFile%/*}"
  210. mkdir -p "${dnsmasqFile%/*}"
  211. if [ "$mainTableListing" -ne 0 ]; then
  212. mainTableListing='default'
  213. else
  214. mainTableListing=''
  215. fi
  216. if [ -n "$icmpIface" ] && ! str_contains_word "$usedChainsList" 'OUTPUT'; then
  217. usedChainsList="$usedChainsList OUTPUT"
  218. fi
  219. case $insertOption in
  220. insert|-i|-I) insertOption='-I';;
  221. append|-a|-A|*) insertOption='-A';;
  222. esac
  223. [ "$resolverIpset" = 'dnsmasq.ipset' ] && dnsmasqIpsetSupported='true'
  224. if dnsmasq -v 2>/dev/null | grep -q 'no-ipset' || ! dnsmasq -v 2>/dev/null | grep -q -w 'ipset'; then
  225. unset dnsmasqIpsetSupported
  226. if [ -n "$dnsmasqIpsetSupported" ]; then
  227. errorSummary="${errorSummary}${_ERROR_}: Resolver ipset support (dnsmasq.ipset) is enabled in $packageName, but DNSMASQ ipsets are not supported on this system!\\n"
  228. fi
  229. fi
  230. if ! ipset help hash:net >/dev/null 2>&1; then
  231. unset ipsetSupported
  232. if [ -n "$dnsmasqIpsetSupported" ]; then
  233. errorSummary="${errorSummary}${_ERROR_}: DNSMASQ ipsets are supported, but ipset is either not installed or installed ipset does not support 'hash:net' type!\\n"
  234. unset dnsmasqIpsetSupported
  235. fi
  236. if [ "$destIpset" -ne 0 ]; then
  237. errorSummary="${errorSummary}${_ERROR_}: Destination ipset support is enabled in $packageName, but ipset is either not installed or installed ipset does not support 'hash:net' type!\\n"
  238. destIpset=0
  239. fi
  240. if [ "$srcIpset" -ne 0 ]; then
  241. errorSummary="${errorSummary}${_ERROR_}: Source ipset support is enabled in $packageName, but ipset is either not installed or installed ipset does not support 'hash:net' type!\\n"
  242. srcIpset=0
  243. fi
  244. fi
  245. if ! ipset help hash:mac >/dev/null 2>&1; then
  246. if [ "$srcIpset" -ne 0 ]; then
  247. errorSummary="${errorSummary}${_ERROR_}: Source ipset support is enabled in $packageName, but ipset is either not installed or installed ipset does not support 'hash:mac' type!\\n"
  248. srcIpset=0
  249. fi
  250. fi
  251. configLoaded='true'
  252. }
  253. is_enabled() {
  254. load_package_config
  255. if [ "$serviceEnabled" -eq 0 ]; then
  256. if [ "$1" = 'on_start' ]; then
  257. errorSummary="${errorSummary}${_ERROR_}: ${packageName} is currently disabled.\\n"
  258. errorSummary="${errorSummary}Enable ${packageName} from WebUI or run the following commands:\\n"
  259. errorSummary="${errorSummary}uci set $packageName.config.enabled='1'; uci commit $packageName;\\n"
  260. fi
  261. return 1
  262. fi
  263. }
  264. load_network() {
  265. if [ -z "$ifAll" ]; then
  266. config_load 'network'
  267. config_foreach build_ifAll 'interface'
  268. fi
  269. vpr_find_iface wanIface4 'wan'
  270. [ "$ipv6Enabled" -ne 0 ] && vpr_find_iface wanIface6 'wan6'
  271. [ -n "$wanIface4" ] && network_get_gateway wanGW4 "$wanIface4"
  272. [ -n "$wanIface6" ] && network_get_gateway6 wanGW6 "$wanIface6"
  273. wanGW="${wanGW4:-$wanGW6}"
  274. unset ifSupported
  275. config_load 'network'
  276. config_foreach build_ifSupported 'interface'
  277. }
  278. is_wan_up() {
  279. local sleepCount=1
  280. load_network
  281. while [ -z "$wanGW" ] ; do
  282. load_network
  283. if [ $((sleepCount)) -gt $((bootTimeout)) ] || [ -n "$wanGW" ]; then break; fi
  284. output "$serviceName waiting for wan gateway...\\n"
  285. sleep 1
  286. network_flush_cache
  287. sleepCount=$((sleepCount+1))
  288. done
  289. if [ -n "$wanGW" ]; then
  290. return 0
  291. else
  292. errorSummary="${errorSummary}${_ERROR_}: ${serviceName} failed to discover WAN gateway!\\n"
  293. return 1
  294. fi
  295. }
  296. ipt_cleanup() {
  297. local i
  298. for i in PREROUTING FORWARD INPUT OUTPUT; do
  299. while iptables -t mangle -D $i -m mark --mark 0x0/0xff0000 -j VPR_${i} >/dev/null 2>&1; do : ; done
  300. done
  301. for i in PREROUTING FORWARD INPUT OUTPUT; do
  302. while iptables -t mangle -D $i -j VPR_${i} >/dev/null 2>&1; do : ; done
  303. done
  304. }
  305. # shellcheck disable=SC2086
  306. ipt() {
  307. local d failFlagIpv4=1 failFlagIpv6=1
  308. for d in "${*//-A/-D}" "${*//-I/-D}" "${*//-N/-F}" "${*//-N/-X}"; do
  309. [ "$d" != "$*" ] && { iptables $d >/dev/null 2>&1; ip6tables $d >/dev/null 2>&1; }
  310. done
  311. d="$*"; iptables $d >/dev/null 2>&1 && failFlagIpv4=0;
  312. if [ "$ipv6Enabled" -gt 0 ]; then ip6tables $d >/dev/null 2>&1 && failFlagIpv6=0; fi
  313. [ "$failFlagIpv4" -eq 0 ] || [ "$failFlagIpv6" -eq 0 ]
  314. }
  315. # shellcheck disable=SC2086
  316. ips() {
  317. local command="$1" ipset="${2//-/_}" param="$3" comment="$4" appendix failFlag=0
  318. if str_contains "$ipset" '_ip'; then
  319. ipset="${ipset//_ip}"; appendix='_ip';
  320. elif str_contains "$ipset" '_mac'; then
  321. ipset="${ipset//_mac}"; appendix='_mac';
  322. fi
  323. case "$command" in
  324. add_dnsmasq)
  325. [ "$resolverIpset" = "dnsmasq.ipset" ] || return 1
  326. if [ -z "$dnsmasqIpsetSupported" ]; then
  327. warningSummary="${warningSummary}${_WARNING_}: The 'resolver_ipset' is set to 'dnsmasq.ipset', but DNSMASQ ipsets are not supported on this system!\\n"
  328. failFlag=1
  329. elif [ "$ipv6Enabled" -ne 0 ]; then
  330. echo "ipset=/${param}/${ipset},${ipset}6 # $comment" >> "$dnsmasqFile" || failFlag=1
  331. else
  332. echo "ipset=/${param}/${ipset} # $comment" >> "$dnsmasqFile" || failFlag=1
  333. fi
  334. ;;
  335. add)
  336. if [ -z "$appendix" ] && [ "$destIpset" -eq 0 ]; then return 1; fi
  337. if [ -n "$appendix" ] && [ "$srcIpset" -eq 0 ]; then return 1; fi
  338. if [ "$ipv6Enabled" -ne 0 ] && [ "$appendix" != "_mac" ]; then
  339. ipset -q -! $command "${ipset}6${appendix}" $param comment "$comment" || failFlag=1
  340. fi
  341. ipset -q -! $command "${ipset}${appendix}" $param comment "$comment" || failFlag=1
  342. ;;
  343. create)
  344. if [ "$ipv6Enabled" -ne 0 ] && [ "$appendix" != "_mac" ]; then
  345. ipset -q -! "$command" "${ipset}6${appendix}" $param family inet6 || failFlag=1
  346. fi
  347. ipset -q -! "$command" "${ipset}${appendix}" $param || failFlag=1
  348. ;;
  349. destroy|flush)
  350. ipset -q -! "$command" "${ipset}6${appendix}" 2>/dev/null || failFlag=1
  351. ipset -q -! "$command" "${ipset}${appendix}" 2>/dev/null || failFlag=1
  352. return 0
  353. ;;
  354. esac
  355. return $failFlag
  356. }
  357. insert_tor_policy() {
  358. local comment="$1" iface="$2" laddr="$3" lport="$4" raddr="$5" rport="$6" proto chain
  359. proto="$(str_to_lower "$7")"
  360. chain="${8:-PREROUTING}"
  361. if [ -n "${laddr}${lport}${rport}" ]; then
  362. processPolicyWarning="${processPolicyWarning}${_WARNING_}: Please unset 'src_addr', 'src_port' and 'dest_port' for policy '$comment'\\n"
  363. fi
  364. if [ -n "$proto" ] && [ "$proto" != "all" ]; then
  365. processPolicyWarning="${processPolicyWarning}${_WARNING_}: Please unset 'proto' or set 'proto' to 'all' for policy '$comment'\\n"
  366. fi
  367. if [ "$chain" != "PREROUTING" ]; then
  368. processPolicyWarning="${processPolicyWarning}${_WARNING_}: Please unset 'chain' or set 'chain' to 'PREROUTING' for policy '$comment'\\n"
  369. fi
  370. ips 'add' "${iface}" "$raddr" "${comment}: $raddr" || processPolicyError="${processPolicyError}${_ERROR_}: ipset 'add' $iface $raddr\\n"
  371. return 0
  372. }
  373. insert_policy() {
  374. local comment="$1" iface="$2" laddr="$3" lport="$4" raddr="$5" rport="$6" proto chain
  375. local mark param i valueNeg value dest ipInsertOption="-A"
  376. proto="$(str_to_lower "$7")"
  377. chain="${8:-PREROUTING}"
  378. mark=$(eval echo "\$mark_${iface//-/_}")
  379. if [ "$ipv6Enabled" -eq 0 ] && ( is_ipv6 "$laddr" || is_ipv6 "$raddr" ); then
  380. processPolicyError="${processPolicyError}${_ERROR_}: Skipping IPv6 policy '$comment' as IPv6 support is disabled\\n"
  381. return 1
  382. fi
  383. if [ -n "$mark" ]; then
  384. dest="-g VPR_MARK${mark}"
  385. elif [ "$iface" = "ignore" ]; then
  386. dest="-j RETURN"
  387. else
  388. processPolicyError="${processPolicyError}${_ERROR_}: Unknown fw_mark for ${iface}\\n"
  389. return 0
  390. fi
  391. if [ -z "$proto" ]; then
  392. if [ -n "$lport" ] || [ -n "$rport" ]; then
  393. proto='tcp udp'
  394. else
  395. proto='all'
  396. fi
  397. fi
  398. if is_family_mismatch "$laddr" "$raddr"; then
  399. processPolicyError="${processPolicyError}${_ERROR_}: Mismatched IP family between '$laddr' and '$raddr' in policy '$comment'\\n"
  400. return 0
  401. fi
  402. for i in $proto; do
  403. if [ "$i" = 'all' ]; then
  404. param="-t mangle ${ipInsertOption} VPR_${chain} $dest"
  405. elif ! is_supported_protocol "$i"; then
  406. processPolicyError="${processPolicyError}${_ERROR_}: Unknown protocol '$i' in policy '$comment'\\n"
  407. return 0
  408. else
  409. param="-t mangle ${ipInsertOption} VPR_${chain} $dest -p $i"
  410. fi
  411. if [ -n "$laddr" ]; then
  412. if [ "${laddr:0:1}" = "!" ]; then
  413. valueNeg='!'; value="${laddr:1}"
  414. else
  415. unset valueNeg; value="$laddr";
  416. fi
  417. if is_phys_dev "$value"; then
  418. param="$param $valueNeg -m physdev --physdev-in ${value:1}"
  419. elif is_mac_address "$value"; then
  420. param="$param -m mac $valueNeg --mac-source $value"
  421. else
  422. param="$param $valueNeg -s $value"
  423. fi
  424. fi
  425. if [ -n "$lport" ]; then
  426. if [ "${lport:0:1}" = "!" ]; then
  427. valueNeg='!'; value="${lport:1}"
  428. else
  429. unset valueNeg; value="$lport";
  430. fi
  431. param="$param -m multiport $valueNeg --sport ${value//-/:}"
  432. fi
  433. if [ -n "$raddr" ]; then
  434. if [ "${raddr:0:1}" = "!" ]; then
  435. valueNeg='!'; value="${raddr:1}"
  436. else
  437. unset valueNeg; value="$raddr";
  438. fi
  439. param="$param $valueNeg -d $value"
  440. fi
  441. if [ -n "$rport" ]; then
  442. if [ "${rport:0:1}" = "!" ]; then
  443. valueNeg='!'; value="${rport:1}"
  444. else
  445. unset valueNeg; value="$rport";
  446. fi
  447. param="$param -m multiport $valueNeg --dport ${value//-/:}"
  448. fi
  449. [ -n "$comment" ] && param="$param -m comment --comment $(str_extras_to_underscore "$comment")"
  450. ipt "$param" || processPolicyError="${processPolicyError}${_ERROR_}: iptables $param\\n"
  451. done
  452. return 0
  453. }
  454. r_process_policy() {
  455. local comment="$1" iface="$2" laddr="$3" lport="$4" raddr="$5" rport="$6" proto="$7" chain="$8" resolved_laddr resolved_raddr i ipsFailFlag
  456. if str_contains "$laddr" '[ ;\{\}]'; then
  457. for i in $(str_extras_to_space "$laddr"); do [ -n "$i" ] && r_process_policy "$comment" "$iface" "$i" "$lport" "$raddr" "$rport" "$proto" "$chain"; done
  458. return 0
  459. elif str_contains "$lport" '[ ;\{\}]'; then
  460. for i in $(str_extras_to_space "$lport"); do [ -n "$i" ] && r_process_policy "$comment" "$iface" "$laddr" "$i" "$raddr" "$rport" "$proto" "$chain"; done
  461. return 0
  462. elif str_contains "$raddr" '[ ;\{\}]'; then
  463. for i in $(str_extras_to_space "$raddr"); do [ -n "$i" ] && r_process_policy "$comment" "$iface" "$laddr" "$lport" "$i" "$rport" "$proto" "$chain"; done
  464. return 0
  465. elif str_contains "$rport" '[ ;\{\}]'; then
  466. for i in $(str_extras_to_space "$rport"); do [ -n "$i" ] && r_process_policy "$comment" "$iface" "$laddr" "$lport" "$raddr" "$i" "$proto" "$chain"; done
  467. return 0
  468. fi
  469. # start non-recursive processing
  470. # process TOR, netmask, physical device and mac-address separately, so we don't send them to resolveip
  471. if is_tor "$iface"; then
  472. insert_tor_policy "$comment" "$iface" "$laddr" "$lport" "$raddr" "$rport" "$proto" "$chain"
  473. elif is_phys_dev "$laddr"; then
  474. insert_policy "$comment" "$iface" "$laddr" "$lport" "$raddr" "$rport" "$proto" "$chain"
  475. elif [ -n "$laddr" ] && [ -z "${lport}${raddr}${rport}" ] && [ "$chain" = 'PREROUTING' ]; then
  476. if is_mac_address "$laddr"; then
  477. if [ -n "$proto" ] && [ "$proto" != 'all' ] && [ "$srcIpset" -ne 0 ]; then
  478. processPolicyWarning="${processPolicyWarning}${_WARNING_}: Please unset 'proto' or set 'proto' to 'all' for policy: '$comment', mac-address: '$laddr'\\n"
  479. fi
  480. ips 'add' "${iface}_mac" "$laddr" "${comment}: $laddr" || ipsFailFlag=1
  481. else
  482. if [ -n "$proto" ] && [ "$proto" != "all" ] && [ "$srcIpset" -ne 0 ]; then
  483. processPolicyWarning="${processPolicyWarning}${_WARNING_}: Please unset 'proto' or set 'proto' to 'all' for policy: '$comment', source: '$laddr'\\n"
  484. fi
  485. ips 'add' "${iface}_ip" "$laddr" "${comment}: $laddr" || ipsFailFlag=1
  486. fi
  487. elif [ -n "$raddr" ] && [ -z "${laddr}${lport}${rport}" ] && [ "$chain" = 'PREROUTING' ]; then
  488. if [ -n "$proto" ] && [ "$proto" != 'all' ]; then
  489. processPolicyWarning="${processPolicyWarning}${_WARNING_}: Please unset 'proto' or set 'proto' to 'all' for policy: '$comment', destination: '$raddr'\\n"
  490. fi
  491. if is_domain "$raddr"; then
  492. ips 'add_dnsmasq' "${iface}" "$raddr" "${comment}" || ipsFailFlag=1
  493. else
  494. ips 'add' "${iface}" "$raddr" "${comment}: $raddr" || ipsFailFlag=1
  495. fi
  496. else
  497. ipsFailFlag=1
  498. fi
  499. [ -n "$ipsFailFlag" ] || return 0;
  500. if is_mac_address "$laddr"; then
  501. insert_policy "$comment" "$iface" "$laddr" "$lport" "$raddr" "$rport" "$proto" "$chain"
  502. elif is_netmask "$laddr" || is_netmask "$raddr"; then
  503. insert_policy "$comment" "$iface" "$laddr" "$lport" "$raddr" "$rport" "$proto" "$chain"
  504. else
  505. [ -n "$laddr" ] && resolved_laddr="$(resolveip "$laddr")"
  506. [ -n "$raddr" ] && resolved_raddr="$(resolveip "$raddr")"
  507. if [ -n "$resolved_laddr" ] && [ "$resolved_laddr" != "$laddr" ]; then
  508. for i in $resolved_laddr; do [ -n "$i" ] && r_process_policy "$comment $laddr" "$iface" "$i" "$lport" "$raddr" "$rport" "$proto" "$chain"; done
  509. elif [ -n "$resolved_raddr" ] && [ "$resolved_raddr" != "$raddr" ]; then
  510. for i in $resolved_raddr; do [ -n "$i" ] && r_process_policy "$comment $raddr" "$iface" "$laddr" "$lport" "$i" "$rport" "$proto" "$chain"; done
  511. else
  512. insert_policy "$comment" "$iface" "$laddr" "$lport" "$raddr" "$rport" "$proto" "$chain"
  513. fi
  514. fi
  515. }
  516. process_policy() {
  517. local name comment iface laddr lport raddr rport param mark processPolicyError processPolicyWarning proto chain enabled
  518. config_get comment "$1" 'comment'
  519. config_get name "$1" 'name' 'blank'
  520. config_get iface "$1" 'interface'
  521. config_get laddr "$1" 'src_addr'
  522. config_get lport "$1" 'src_port'
  523. config_get raddr "$1" 'dest_addr'
  524. config_get rport "$1" 'dest_port'
  525. config_get proto "$1" 'proto'
  526. config_get chain "$1" 'chain' 'PREROUTING'
  527. config_get_bool enabled "$1" 'enabled' 1
  528. [ "$enabled" -gt 0 ] || return 0
  529. proto="$(str_to_lower "$proto")"
  530. [ "$proto" = 'auto' ] && unset proto
  531. comment="${comment:-$name}"
  532. output 2 "Routing '$comment' via $iface "
  533. if [ -z "$comment" ]; then
  534. errorSummary="${errorSummary}${_ERROR_}: Policy name is empty\\n"
  535. output_fail; return 1;
  536. fi
  537. if [ -z "${laddr}${lport}${raddr}${rport}" ]; then
  538. errorSummary="${errorSummary}${_ERROR_}: Policy '$comment' missing all IPs/ports\\n"
  539. output_fail; return 1;
  540. fi
  541. if [ -z "$iface" ]; then
  542. errorSummary="${errorSummary}${_ERROR_}: Policy '$comment' has no assigned interface\\n"
  543. output_fail; return 1;
  544. fi
  545. if ! is_supported_interface "$iface"; then
  546. errorSummary="${errorSummary}${_ERROR_}: Policy '$comment' has unknown interface: '${iface}'\\n"
  547. output_fail; return 1;
  548. fi
  549. lport="${lport// / }"; lport="${lport// /,}"; lport="${lport//,\!/ !}";
  550. rport="${rport// / }"; rport="${rport// /,}"; rport="${rport//,\!/ !}";
  551. r_process_policy "$comment" "$iface" "$laddr" "$lport" "$raddr" "$rport" "$proto" "$chain"
  552. if [ -n "$processPolicyWarning" ]; then
  553. warningSummary="${warningSummary}${processPolicyWarning}\\n"
  554. fi
  555. if [ -n "$processPolicyError" ]; then
  556. output_fail
  557. errorSummary="${errorSummary}${processPolicyError}\\n"
  558. else
  559. output_ok
  560. fi
  561. }
  562. table_destroy() {
  563. local tid="$1" iface="$2" mark="$3"
  564. if [ -n "$tid" ] && [ -n "$iface" ] && [ -n "$mark" ]; then
  565. ipt -t mangle -F "VPR_MARK${mark}"
  566. ipt -t mangle -X "VPR_MARK${mark}"
  567. ip rule del fwmark "$mark" table "$tid" >/dev/null 2>&1
  568. ip rule del table "$tid" >/dev/null 2>&1
  569. ip route flush table "$tid" >/dev/null 2>&1
  570. ips 'flush' "${iface}"; ips 'destroy' "${iface}";
  571. ips 'flush' "${iface}_ip"; ips 'destroy' "${iface}_ip";
  572. ips 'flush' "${iface}_mac"; ips 'destroy' "${iface}_mac";
  573. ip route flush cache
  574. sed -i "/$iface/d" /etc/iproute2/rt_tables
  575. return 0
  576. else
  577. return 1
  578. fi
  579. }
  580. # shellcheck disable=SC2086
  581. table_create() {
  582. local tid="$1" mark="$2" iface="$3" gw4="$4" dev="$5" gw6="$6" dev6="$7" match="$8" dscp s=0 i ipv4_error=0 ipv6_error=1
  583. if [ -z "$tid" ] || [ -z "$mark" ] || [ -z "$iface" ]; then
  584. return 1
  585. fi
  586. sed -i "/$iface/d" /etc/iproute2/rt_tables
  587. ip route flush table "$tid" >/dev/null 2>&1
  588. if [ -n "$gw4" ] || [ "$strictMode" -ne 0 ]; then
  589. echo "$tid $iface" >> /etc/iproute2/rt_tables
  590. if [ -z "$gw4" ]; then
  591. ip -4 route add unreachable default table "$tid" >/dev/null 2>&1 || ipv4_error=1
  592. else
  593. ip -4 route add default via "$gw4" dev "$dev" table "$tid" >/dev/null 2>&1 || ipv4_error=1
  594. fi
  595. while read -r i; do
  596. idev="$(echo "$i" | grep -Eso 'dev [^ ]*' | awk '{print $2}')"
  597. if ! is_supported_iface_dev "$idev"; then
  598. ip -4 route add $i table "$tid" >/dev/null 2>&1 || ipv4_error=1
  599. fi
  600. done << EOF
  601. $(ip -4 route list $mainTableListing table main)
  602. EOF
  603. [ -n "$(ip rule list fwmark "${mark}/${fwMask}" table "$tid")" ] || \
  604. ip rule add fwmark "${mark}/${fwMask}" table "$tid" || ipv4_error=1
  605. ipt -t mangle -N "VPR_MARK${mark}" || ipv4_error=1
  606. ipt -t mangle -A "VPR_MARK${mark}" -j MARK --set-xmark "${mark}/${fwMask}" || ipv4_error=1
  607. ipt -t mangle -A "VPR_MARK${mark}" -j RETURN || ipv4_error=1
  608. fi
  609. if [ "$ipv6Enabled" -ne 0 ]; then
  610. ipv6_error=0
  611. if { [ -n "$gw6" ] && [ "$gw6" != "::/0" ]; } || [ "$strictMode" -ne 0 ]; then
  612. if [ -z "$gw6" ] || [ "$gw6" = "::/0" ]; then
  613. ip -6 route add unreachable default table "$tid" || ipv6_error=1
  614. else
  615. while read -r i; do
  616. ip -6 route add $i table "$tid" >/dev/null 2>&1 || ipv6_error=1
  617. done << EOF
  618. $(ip -6 route list $mainTableListing table main | grep " dev $dev6 ")
  619. EOF
  620. fi
  621. fi
  622. fi
  623. if [ "$ipv4_error" -eq 0 ] || [ "$ipv6_error" -eq 0 ]; then
  624. dscp="$(uci -q get "${packageName}".config."${iface}"_dscp)"
  625. if [ "${dscp:-0}" -ge 1 ] && [ "${dscp:-0}" -le 63 ]; then
  626. ipt -t mangle -I VPR_PREROUTING -m dscp --dscp "${dscp}" -g "VPR_MARK${mark}" || s=1
  627. fi
  628. if [ -n "$ipsetSupported" ] && { [ -n "$dnsmasqIpsetSupported" ] || [ "$destIpset" -ne 0 ]; }; then
  629. if ips 'create' "${iface}" 'hash:net comment' && ips 'flush' "${iface}"; then
  630. for i in $usedChainsList; do
  631. ipt -t mangle -I VPR_${i} -m set --match-set "${iface}" dst -g "VPR_MARK${mark}" || s=1
  632. if [ "$ipv6Enabled" -ne 0 ]; then ipt -t mangle -I VPR_${i} -m set --match-set "${iface}6" dst -g "VPR_MARK${mark}" || s=1; fi
  633. done
  634. else
  635. s=1
  636. fi
  637. fi
  638. if [ -n "$ipsetSupported" ] && [ "$srcIpset" -ne 0 ]; then
  639. if ips 'create' "${iface}_ip" 'hash:net comment' && ips 'flush' "${iface}_ip"; then
  640. ipt -t mangle -I VPR_PREROUTING -m set --match-set "${iface}_ip" src -g "VPR_MARK${mark}" || s=1
  641. if [ "$ipv6Enabled" -ne 0 ]; then ipt -t mangle -I VPR_PREROUTING -m set --match-set "${iface}6_ip" src -g "VPR_MARK${mark}" || s=1; fi
  642. else
  643. s=1
  644. fi
  645. if ips 'create' "${iface}_mac" 'hash:mac comment' && ips 'flush' "${iface}_mac"; then
  646. ipt -t mangle -I VPR_PREROUTING -m set --match-set "${iface}_mac" src -g "VPR_MARK${mark}" || s=1
  647. else
  648. s=1
  649. fi
  650. fi
  651. if [ "$iface" = "$icmpIface" ]; then
  652. ipt -t mangle -I VPR_OUTPUT -p icmp -g "VPR_MARK${mark}" || s=1
  653. fi
  654. else
  655. s=1
  656. fi
  657. return $s
  658. }
  659. table_reload() {
  660. local tid="$1" mark="$2" iface="$3" gw4="$4" dev="$5" gw6="$6" dev6="$7" match="$8" dscp s=0 i ipv4_error=0 ipv6_error=1
  661. if [ -z "$tid" ] || [ -z "$mark" ] || [ -z "$iface" ]; then
  662. return 1
  663. fi
  664. ip -4 route del default table "$tid" >/dev/null 2>&1
  665. if [ -n "$gw4" ] || [ "$strictMode" -ne 0 ]; then
  666. if [ -z "$gw4" ]; then
  667. ip -4 route add unreachable default table "$tid" >/dev/null 2>&1 || ipv4_error=1
  668. else
  669. ip -4 route add default via "$gw4" dev "$dev" table "$tid" >/dev/null 2>&1 || ipv4_error=1
  670. fi
  671. ip -4 route flush cache || ipv4_error=1
  672. ip -4 rule del fwmark "${mark}/${fwMask}" table "$tid" >/dev/null 2>&1
  673. ip -4 rule add fwmark "${mark}/${fwMask}" table "$tid" || ipv4_error=1
  674. fi
  675. if [ "$ipv6Enabled" -ne 0 ]; then
  676. ip -6 route del default table "$tid" >/dev/null 2>&1
  677. ipv6_error=0
  678. if { [ -n "$gw6" ] && [ "$gw6" != "::/0" ]; } || [ "$strictMode" -ne 0 ]; then
  679. if [ -z "$gw6" ] || [ "$gw6" = "::/0" ]; then
  680. ip -6 route add unreachable default table "$tid" || ipv6_error=1
  681. else
  682. ip -6 route list table main | grep " dev $dev6 " | while read -r i; do
  683. ip -6 route add "$i" table "$tid" >/dev/null 2>&1 || ipv6_error=1
  684. done
  685. fi
  686. ip -6 route flush cache || ipv6_error=1
  687. ip -6 rule del fwmark "${mark}/${fwMask}" table "$tid" >/dev/null 2>&1
  688. ip -6 rule add fwmark "${mark}/${fwMask}" table "$tid" || ipv6_error=1
  689. fi
  690. fi
  691. if [ "$ipv4_error" -eq 0 ] || [ "$ipv6_error" -eq 0 ]; then
  692. dscp="$(uci -q get "${packageName}".config."${iface}"_dscp)"
  693. if [ "${dscp:-0}" -ge 1 ] && [ "${dscp:-0}" -le 63 ]; then
  694. ipt -t mangle -I VPR_PREROUTING -m dscp --dscp "${dscp}" -g "VPR_MARK${mark}" || s=1
  695. fi
  696. if [ "$iface" = "$icmpIface" ]; then
  697. ipt -t mangle -I VPR_OUTPUT -p icmp -g "VPR_MARK${mark}" || s=1
  698. fi
  699. else
  700. s=1
  701. fi
  702. return $s
  703. }
  704. process_interface() {
  705. local gw4 gw6 dev dev6 s=0 dscp iface="$1" action="$2" match="$3" displayText
  706. is_supported_interface "$iface" || return 0
  707. is_wan6 "$iface" && return 0
  708. [ $((ifaceMark)) -gt $((fwMask)) ] && return 1
  709. network_get_device dev "$iface"
  710. [ -z "$dev" ] && config_get dev "$iface" 'ifname'
  711. [ -z "$dev" ] && config_get dev "$iface" 'device'
  712. if is_wan "$iface" && [ -n "$wanIface6" ]; then
  713. network_get_device dev6 "$wanIface6"
  714. [ -z "$dev6" ] && config_get dev6 "$wanIface6" 'ifname'
  715. [ -z "$dev6" ] && config_get dev6 "$wanIface6" 'device'
  716. fi
  717. [ -z "$dev6" ] && dev6="$dev"
  718. [ -z "$ifaceTableID" ] && ifaceTableID="$wanTableID"; [ -z "$ifaceMark" ] && ifaceMark="$wanMark";
  719. case "$action" in
  720. destroy)
  721. table_destroy "${ifaceTableID}" "${iface}" "${ifaceMark}"
  722. ifaceTableID="$((ifaceTableID + 1))"; ifaceMark="$(printf '0x%06x' $((ifaceMark + wanMark)))";
  723. ;;
  724. create)
  725. eval "mark_${iface//-/_}"='$ifaceMark'
  726. eval "tid_${iface//-/_}"='$ifaceTableID'
  727. vpr_get_gateway gw4 "$iface" "$dev"
  728. vpr_get_gateway6 gw6 "$iface" "$dev6"
  729. if [ "$iface" = "$dev" ]; then
  730. displayText="${iface}/${gw4:-0.0.0.0}"
  731. else
  732. displayText="${iface}/${dev}/${gw4:-0.0.0.0}"
  733. fi
  734. [ "$ipv6Enabled" -ne 0 ] && displayText="${displayText}/${gw6:-::/0}"
  735. if [ -z "$match" ]; then
  736. output 2 "Creating table '$displayText' "
  737. is_default_dev "$dev" && displayText="${displayText} ${__OK__}"
  738. if table_create "$ifaceTableID" "$ifaceMark" "$iface" "$gw4" "$dev" "$gw6" "$dev6" "$match"; then
  739. gatewaySummary="${gatewaySummary}${displayText}\\n"
  740. output_ok
  741. else
  742. errorSummary="${errorSummary}${_ERROR_}: Failed to set up '$displayText'\\n"
  743. output_fail
  744. fi
  745. elif [ "$iface" = "$match" ]; then
  746. output 2 "Reloading table '$displayText' "
  747. is_default_dev "$dev" && displayText="${displayText} ${__OK__}"
  748. if table_reload "$ifaceTableID" "$ifaceMark" "$iface" "$gw4" "$dev" "$gw6" "$dev6" "$match"; then
  749. gatewaySummary="${gatewaySummary}${displayText}\\n"
  750. output_ok
  751. else
  752. errorSummary="${errorSummary}${_ERROR_}: Failed to reload '$displayText'\\n"
  753. output_fail
  754. fi
  755. else
  756. is_default_dev "$dev" && displayText="${displayText} ${__OK__}"
  757. gatewaySummary="${gatewaySummary}${displayText}\\n"
  758. fi
  759. ifaceTableID="$((ifaceTableID + 1))"; ifaceMark="$(printf '0x%06x' $((ifaceMark + wanMark)))";
  760. ;;
  761. esac
  762. return $s
  763. }
  764. process_tor_interface() {
  765. local s=0 iface="$1" action="$2" displayText
  766. case "$action" in
  767. destroy)
  768. for i in PREROUTING FORWARD INPUT OUTPUT; do
  769. ipt -t nat -D "${i}" -m mark --mark "0x0/${fwMask}" -j "VPR_${i}"
  770. ipt -t nat -F "VPR_${i}"; ipt -t nat -X "VPR_${i}";
  771. done
  772. ;;
  773. create)
  774. output 2 "Creating TOR redirects "
  775. dnsPort="$(grep -m1 DNSPort /etc/tor/torrc | awk -F: '{print $2}')"
  776. transPort="$(grep -m1 TransPort /etc/tor/torrc | awk -F: '{print $2}')"
  777. dnsPort="${dnsPort:-9053}"; transPort="${transPort:-9040}";
  778. for i in $usedChainsList; do
  779. ipt -t nat -N "VPR_${i}"
  780. ipt -t nat "$insertOption" "$i" -m mark --mark "0x0/${fwMask}" -j "VPR_${i}"
  781. done
  782. if ips 'create' "${iface}" 'hash:net comment' && ips 'flush' "${iface}"; then
  783. for i in $usedChainsList; do
  784. ipt -t nat -I "VPR_${i}" -p udp -m udp --dport 53 -m set --match-set "${iface}" dst -j REDIRECT --to-ports "$dnsPort" -m comment --comment "TorDNS-UDP" || s=1
  785. ipt -t nat -I "VPR_${i}" -p tcp -m tcp --dport 80 -m set --match-set "${iface}" dst -j REDIRECT --to-ports "$transPort" -m comment --comment "TorHTTP-TCP" || s=1
  786. ipt -t nat -I "VPR_${i}" -p udp -m udp --dport 80 -m set --match-set "${iface}" dst -j REDIRECT --to-ports "$transPort" -m comment --comment "TorHTTP-UDP" || s=1
  787. ipt -t nat -I "VPR_${i}" -p tcp -m tcp --dport 443 -m set --match-set "${iface}" dst -j REDIRECT --to-ports "$transPort" -m comment --comment "TorHTTPS-TCP" || s=1
  788. ipt -t nat -I "VPR_${i}" -p udp -m udp --dport 443 -m set --match-set "${iface}" dst -j REDIRECT --to-ports "$transPort" -m comment --comment "TorHTTPS-UDP" || s=1
  789. done
  790. else
  791. s=1
  792. fi
  793. displayText="${iface}/53->${dnsPort}/80,443->${transPort}"
  794. if [ "$s" -eq 0 ]; then
  795. gatewaySummary="${gatewaySummary}${displayText}\\n"
  796. output_ok
  797. else
  798. errorSummary="${errorSummary}${_ERROR_}: Failed to set up '$displayText'\\n"
  799. output_fail
  800. fi
  801. ;;
  802. esac
  803. return $s
  804. }
  805. convert_config() {
  806. local i src_ipset dest_ipset resolver_ipset
  807. [ -s "/etc/config/${packageName}" ] || return 0
  808. grep -q "ignored_interfaces" "/etc/config/${packageName}" && sed -i 's/ignored_interfaces/ignored_interface/g' "/etc/config/${packageName}"
  809. grep -q "supported_interfaces" "/etc/config/${packageName}" && sed -i 's/supported_interfaces/supported_interface/g' "/etc/config/${packageName}"
  810. grep -q "local_addresses" "/etc/config/${packageName}" && sed -i 's/local_addresses/local_address/g' "/etc/config/${packageName}"
  811. grep -q "local_ports" "/etc/config/${packageName}" && sed -i 's/local_ports/local_port/g' "/etc/config/${packageName}"
  812. grep -q "remote_addresses" "/etc/config/${packageName}" && sed -i 's/remote_addresses/remote_address/g' "/etc/config/${packageName}"
  813. grep -q "remote_ports" "/etc/config/${packageName}" && sed -i 's/remote_ports/remote_port/g' "/etc/config/${packageName}"
  814. grep -q "ipset_enabled" "/etc/config/${packageName}" && sed -i 's/ipset_enabled/dest_ipset/g' "/etc/config/${packageName}"
  815. grep -q "dnsmasq_enabled" "/etc/config/${packageName}" && sed -i 's/dnsmasq_enabled/resolver_ipset/g' "/etc/config/${packageName}"
  816. grep -q "enable_control" "/etc/config/${packageName}" && sed -i 's/enable_control/webui_enable_column/g' "/etc/config/${packageName}"
  817. grep -q "proto_control" "/etc/config/${packageName}" && sed -i 's/proto_control/webui_protocol_column/g' "/etc/config/${packageName}"
  818. grep -q "chain_control" "/etc/config/${packageName}" && sed -i 's/chain_control/webui_chain_column/g' "/etc/config/${packageName}"
  819. grep -q "sort_control" "/etc/config/${packageName}" && sed -i 's/sort_control/webui_sorting/g' "/etc/config/${packageName}"
  820. grep -q "local_address" "/etc/config/${packageName}" && sed -i 's/local_address/src_addr/g' "/etc/config/${packageName}"
  821. grep -q "local_port" "/etc/config/${packageName}" && sed -i 's/local_port/src_port/g' "/etc/config/${packageName}"
  822. grep -q "remote_address" "/etc/config/${packageName}" && sed -i 's/remote_address/dest_addr/g' "/etc/config/${packageName}"
  823. grep -q "remote_port" "/etc/config/${packageName}" && sed -i 's/remote_port/dest_port/g' "/etc/config/${packageName}"
  824. grep -q "local_ipset" "/etc/config/${packageName}" && sed -i 's/local_ipset/src_ipset/g' "/etc/config/${packageName}"
  825. grep -q "remote_ipset" "/etc/config/${packageName}" && sed -i 's/remote_ipset/dest_ipset/g' "/etc/config/${packageName}"
  826. dest_ipset="$(uci -q get $packageName.config.dest_ipset)"
  827. src_ipset="$(uci -q get $packageName.config.src_ipset)"
  828. resolver_ipset="$(uci -q get $packageName.config.resolver_ipset)"
  829. if [ -n "$dest_ipset" ] && [ "$dest_ipset" != "0" ] && [ "$dest_ipset" != "1" ]; then
  830. uci set "$packageName".config.dest_ipset='0'
  831. if [ -z "$resolver_ipset" ]; then
  832. uci set "$packageName".config.resolver_ipset='dnsmasq.ipset'
  833. fi
  834. uci commit "$packageName"
  835. fi
  836. if [ -n "$src_ipset" ] && [ "$src_ipset" != "0" ] && [ "$src_ipset" != "1" ]; then
  837. uci set "$packageName".config.src_ipset='1'
  838. uci commit "$packageName"
  839. fi
  840. if [ -z "$(uci -q get $packageName.config.webui_supported_protocol)" ]; then
  841. uci add_list "$packageName".config.webui_supported_protocol='tcp'
  842. uci add_list "$packageName".config.webui_supported_protocol='udp'
  843. uci add_list "$packageName".config.webui_supported_protocol='tcp udp'
  844. uci add_list "$packageName".config.webui_supported_protocol='icmp'
  845. uci add_list "$packageName".config.webui_supported_protocol='all'
  846. uci commit "$packageName"
  847. fi
  848. for i in append_local_rules append_src_rules \
  849. append_remote_rules append_dest_rules; do
  850. if [ -n "$(uci -q get $packageName.config.$i)" ]; then
  851. warningSummary="${warningSummary}$_WARNING_: $i setting is not supported in ${serviceName}.\\n"
  852. fi
  853. done
  854. for i in udp_proto_enabled forward_chain_enabled input_chain_enabled \
  855. output_chain_enabled iprule_enabled; do
  856. if [ "$(uci -q get $packageName.config.$i)" = "1" ]; then
  857. warningSummary="${warningSummary}$_WARNING_: $i setting is not supported in ${serviceName}.\\n"
  858. fi
  859. done
  860. }
  861. check_config() { local en; config_get_bool en "$1" 'enabled' 1; [ "$en" -gt 0 ] && _cfg_enabled=0; }
  862. is_config_enabled() {
  863. local cfg="$1" _cfg_enabled=1
  864. [ -n "$1" ] || return 1
  865. config_load "$packageName"
  866. config_foreach check_config "$cfg"
  867. return "$_cfg_enabled"
  868. }
  869. process_user_file() {
  870. local path enabled shellBin="${SHELL:-/bin/ash}"
  871. config_get_bool enabled "$1" 'enabled' 1
  872. config_get path "$1" 'path'
  873. [ "$enabled" -gt 0 ] || return 0
  874. if [ ! -s "$path" ]; then
  875. errorSummary="${errorSummary}${_ERROR_}: Custom user file '$path' not found or empty!\\n"
  876. output_fail
  877. return 1
  878. fi
  879. if ! $shellBin -n "$path"; then
  880. errorSummary="${errorSummary}${_ERROR_}: Syntax error in custom user file '$path'!\\n"
  881. output_fail
  882. return 1
  883. fi
  884. output 2 "Running $path "
  885. # shellcheck disable=SC1090
  886. if ! . "$path"; then
  887. errorSummary="${errorSummary}${_ERROR_}: Error running custom user file '$path'!\\n"
  888. if grep -q -w 'curl' "$path" && ! is_present 'curl'; then
  889. errorSummary="${errorSummary}${_ERROR_}: Use of 'curl' is detected in custom user file '$path', but 'curl' isn't installed!\\n"
  890. errorSummary="${errorSummary}${_ERROR_}: If 'curl' is needed, install it with 'opkg update; opkg install curl;' command in CLI.\\n"
  891. fi
  892. output_fail
  893. return 1
  894. else
  895. output_ok
  896. return 0
  897. fi
  898. }
  899. boot() { rc_procd start_service && rc_procd service_triggers; }
  900. start_service() {
  901. local dnsmasqStoredHash dnsmasqNewHash i modprobeStatus=0 reloadedIface="$1"
  902. convert_config
  903. is_enabled 'on_start' || return 1
  904. is_wan_up || return 1
  905. iptables -t 'mangle' --list 'VPR_PREROUTING' >/dev/null 2>&1 || unset reloadedIface
  906. [ -n "$(tmpfs get status)" ] || unset reloadedIface
  907. if [ -s "$dnsmasqFile" ]; then
  908. dnsmasqStoredHash="$(md5sum $dnsmasqFile | awk '{ print $1; }')"
  909. rm -f "$dnsmasqFile"
  910. fi
  911. for i in xt_set ip_set ip_set_hash_ip; do
  912. modprobe "$i" >/dev/null 2>/dev/null || modprobeStatus=$((modprobeStatus + 1))
  913. done
  914. if [ "$modprobeStatus" -gt 0 ] && ! is_chaos_calmer; then
  915. errorSummary="${errorSummary}${_ERROR_}: Failed to load kernel modules\\n"
  916. fi
  917. if [ -z "$reloadedIface" ]; then
  918. for i in $usedChainsList; do
  919. ipt -t mangle -N "VPR_${i}"
  920. ipt -t mangle "$insertOption" "$i" -m mark --mark "0x0/${fwMask}" -j "VPR_${i}"
  921. done
  922. fi
  923. if [ -z "$reloadedIface" ]; then
  924. output 1 'Processing Interfaces '
  925. config_load 'network'; config_foreach process_interface 'interface' 'create';
  926. process_tor_interface 'tor' 'destroy'; is_tor_running && process_tor_interface 'tor' 'create';
  927. ip route flush cache
  928. output 1 '\n'
  929. if is_config_enabled 'policy'; then
  930. output 1 'Processing Policies '
  931. config_load "$packageName"; config_foreach process_policy 'policy' "$reloadedIface";
  932. output 1 '\n'
  933. fi
  934. if is_config_enabled 'include'; then
  935. output 1 'Processing User File(s) '
  936. config_load "$packageName"; config_foreach process_user_file 'include';
  937. output 1 '\n'
  938. fi
  939. else
  940. output 1 "Reloading Interface: $reloadedIface "
  941. config_load 'network'; config_foreach process_interface 'interface' 'create' "$reloadedIface";
  942. output 1 '\n'
  943. fi
  944. if [ -s "$dnsmasqFile" ]; then
  945. dnsmasqNewHash="$(md5sum $dnsmasqFile | awk '{ print $1; }')"
  946. fi
  947. [ "$dnsmasqNewHash" != "$dnsmasqStoredHash" ] && dnsmasq_restart
  948. if [ -z "$gatewaySummary" ]; then
  949. errorSummary="${errorSummary}${_ERROR_}: failed to set up any gateway!\\n"
  950. fi
  951. procd_open_instance "main"
  952. procd_set_param command /bin/true
  953. procd_set_param stdout 1
  954. procd_set_param stderr 1
  955. procd_open_data
  956. json_add_array 'status'
  957. json_add_object ''
  958. [ -n "$gatewaySummary" ] && json_add_string gateway "$gatewaySummary"
  959. [ -n "$errorSummary" ] && json_add_string error "$errorSummary"
  960. [ -n "$warningSummary" ] && json_add_string warning "$warningSummary"
  961. if [ "$strictMode" -ne 0 ] && str_contains "$gatewaySummary" '0.0.0.0'; then
  962. json_add_string mode "strict"
  963. fi
  964. json_close_object
  965. json_close_array
  966. procd_close_data
  967. procd_close_instance
  968. }
  969. tmpfs() {
  970. local action="$1" param="$2" value="$3"
  971. # shellcheck disable=SC2034
  972. local gateway error warning mode i
  973. if [ -s "$jsonFile" ]; then
  974. json_load_file "$jsonFile" 2>/dev/null
  975. json_select 'status' 2>/dev/null
  976. for i in gateway error warning mode; do
  977. json_get_var $i "$i" 2>/dev/null
  978. done
  979. fi
  980. case "$action" in
  981. get)
  982. printf "%b" "$(eval echo "\$$param")"; return;;
  983. add)
  984. eval "$param"='$(eval echo "\$$param")${value}';;
  985. del)
  986. case "$param" in
  987. all)
  988. unset gateway error warning mode;;
  989. *)
  990. unset "$param";;
  991. esac
  992. ;;
  993. set)
  994. eval "$param"='$value';;
  995. esac
  996. json_init
  997. json_add_object 'status'
  998. json_add_string version "$PKG_VERSION"
  999. for i in gateway error warning mode; do
  1000. json_add_string "$i" "$(eval echo "\$$i")"
  1001. done
  1002. json_close_object
  1003. json_dump > "$jsonFile"
  1004. sync
  1005. }
  1006. service_started() {
  1007. tmpfs set 'gateway' "$gatewaySummary"
  1008. tmpfs set 'error' "$errorSummary"
  1009. tmpfs set 'warning' "$warningSummary"
  1010. if [ "$strictMode" -ne 0 ] && str_contains "$gatewaySummary" '0.0.0.0'; then
  1011. tmpfs set 'mode' 'strict'
  1012. fi
  1013. [ -n "$gatewaySummary" ] && output "$serviceName started with gateways:\\n${gatewaySummary}"
  1014. [ -n "$errorSummary" ] && output "${errorSummary}"
  1015. [ -n "$warningSummary" ] && output "${warningSummary}"
  1016. if [ -n "$errorSummary" ]; then
  1017. return 2
  1018. elif [ -n "$warningSummary" ]; then
  1019. return 1
  1020. else
  1021. return 0
  1022. fi
  1023. }
  1024. stop_service() {
  1025. local i
  1026. iptables -t mangle -L | grep -q VPR_PREROUTING || return 0
  1027. load_package_config
  1028. for i in PREROUTING FORWARD INPUT OUTPUT; do
  1029. ipt -t mangle -D "${i}" -m mark --mark "0x0/${fwMask}" -j "VPR_${i}"
  1030. ipt -t mangle -F "VPR_${i}"; ipt -t mangle -X "VPR_${i}";
  1031. done
  1032. config_load 'network'; config_foreach process_interface 'interface' 'destroy';
  1033. process_tor_interface 'tor' 'destroy'
  1034. unset ifaceTableID; unset ifaceMark;
  1035. if [ -s "$dnsmasqFile" ]; then
  1036. rm -f "$dnsmasqFile"
  1037. dnsmasq_restart
  1038. fi
  1039. if [ "$serviceEnabled" -ne 0 ]; then
  1040. output "$serviceName stopped "; output_okn;
  1041. fi
  1042. }
  1043. reload_interface() { rc_procd start_service "$1"; }
  1044. service_triggers() {
  1045. local n
  1046. is_enabled || return 1
  1047. if [ "$procdReloadDelay" -gt 0 ] && [ "$procdReloadDelay" -lt 100 ]; then
  1048. # shellcheck disable=SC2034
  1049. PROCD_RELOAD_DELAY=$(( procdReloadDelay * 1000 ))
  1050. fi
  1051. procd_open_validate
  1052. validate_config
  1053. validate_policy
  1054. validate_include
  1055. procd_close_validate
  1056. procd_open_trigger
  1057. procd_add_reload_trigger 'openvpn'
  1058. if type procd_add_service_trigger 1>/dev/null 2>&1; then
  1059. procd_add_service_trigger "service.restart" "firewall" /etc/init.d/${packageName} reload
  1060. fi
  1061. procd_add_config_trigger "config.change" "${packageName}" /etc/init.d/${packageName} reload
  1062. for n in $ifSupported; do
  1063. procd_add_interface_trigger "interface.*" "$n" /etc/init.d/${packageName} reload_interface "$n"
  1064. done
  1065. procd_close_trigger
  1066. output 3 "$serviceName monitoring interfaces: $ifSupported"; output_okn;
  1067. }
  1068. status_service() { support "$@"; }
  1069. support() {
  1070. local dist vers out id s param status set_d set_p tableCount i=0 dev dev6 j
  1071. readonly _SEPARATOR_='============================================================'
  1072. is_enabled
  1073. json_load "$(ubus call system board)"; json_select release; json_get_var dist distribution; json_get_var vers version
  1074. if [ -n "$wanIface4" ]; then
  1075. network_get_gateway wanGW4 "$wanIface4"
  1076. [ -z "$dev" ] && dev="$(uci -q get network."${wanIface4}".ifname)"
  1077. [ -z "$dev" ] && dev="$(uci -q get network."${wanIface4}".device)"
  1078. fi
  1079. if [ -n "$wanIface6" ]; then
  1080. [ -z "$dev6" ] && dev6="$(uci -q get network."${wanIface6}".ifname)"
  1081. [ -z "$dev6" ] && dev6="$(uci -q get network."${wanIface6}".device)"
  1082. wanGW6=$(ip -6 route show | grep -m1 " dev $dev6 " | awk '{print $1}')
  1083. [ "$wanGW6" = "default" ] && wanGW6=$(ip -6 route show | grep -m1 " dev $dev6 " | awk '{print $3}')
  1084. fi
  1085. while [ "${1:0:1}" = "-" ]; do param="${1//-/}"; eval "set_$param=1"; shift; done
  1086. [ -e "/var/${packageName}-support" ] && rm -f "/var/${packageName}-support"
  1087. status="$serviceName running on $dist $vers."
  1088. [ -n "$wanIface4" ] && status="$status WAN (IPv4): ${wanIface4}/${dev}/${wanGW4:-0.0.0.0}."
  1089. [ -n "$wanIface6" ] && status="$status WAN (IPv6): ${wanIface6}/${dev6}/${wanGW6:-::/0}."
  1090. {
  1091. echo "$status"
  1092. echo "$_SEPARATOR_"
  1093. dnsmasq --version 2>/dev/null | sed '/^$/,$d'
  1094. if [ -n "$1" ]; then
  1095. echo "$_SEPARATOR_"
  1096. echo "Resolving domains"
  1097. for i in $1; do
  1098. echo "$i: $(resolveip "$i" | tr '\n' ' ')"
  1099. done
  1100. fi
  1101. echo "$_SEPARATOR_"
  1102. echo "Routes/IP Rules"
  1103. tableCount=$(ip rule list | grep -c 'fwmark') || tableCount=0
  1104. if [ -n "$set_d" ]; then route; else route | grep '^default'; fi
  1105. if [ -n "$set_d" ]; then ip rule list; fi
  1106. i=0; while [ $i -lt $tableCount ]; do
  1107. echo ""
  1108. echo "IPv4 Table $((wanTableID + i)): $(ip -4 route show table $((wanTableID + i)))"
  1109. echo "IPv4 Table $((wanTableID + i)) Rules:"
  1110. ip -4 rule list table "$((wanTableID + i))"
  1111. i=$((i + 1))
  1112. done
  1113. if [ "$ipv6Enabled" -ne 0 ]; then
  1114. i=0; while [ $i -lt $tableCount ]; do
  1115. ip -6 route show table $((wanTableID + i)) | while read -r param; do
  1116. echo "IPv6 Table $((wanTableID + i)): $param"
  1117. done
  1118. i=$((i + 1))
  1119. done
  1120. fi
  1121. for j in Mangle NAT; do
  1122. if [ -z "$set_d" ]; then
  1123. for i in $usedChainsList; do
  1124. if iptables -v -t "$(str_to_lower $j)" -S "VPR_${i}" 1>/dev/null 2>&1; then
  1125. echo "$_SEPARATOR_"
  1126. echo "$j IP Table: $i"
  1127. iptables -v -t "$(str_to_lower $j)" -S "VPR_${i}"
  1128. if [ "$ipv6Enabled" -ne 0 ]; then
  1129. echo "$_SEPARATOR_"
  1130. echo "$j IPv6 Table: $i"
  1131. ip6tables -v -t "$(str_to_lower $j)" -S "VPR_${i}"
  1132. fi
  1133. fi
  1134. done
  1135. else
  1136. echo "$_SEPARATOR_"
  1137. echo "$j IP Table"
  1138. iptables -L -t "$(str_to_lower $j)"
  1139. if [ "$ipv6Enabled" -ne 0 ]; then
  1140. echo "$_SEPARATOR_"
  1141. echo "$j IPv6 Table"
  1142. ip6tables -L -t "$(str_to_lower $j)"
  1143. fi
  1144. fi
  1145. i=0; ifaceMark="$wanMark";
  1146. while [ $i -lt $tableCount ]; do
  1147. if iptables -v -t "$(str_to_lower $j)" -S "VPR_MARK${ifaceMark}" 1>/dev/null 2>&1; then
  1148. echo "$_SEPARATOR_"
  1149. echo "$j IP Table MARK Chain: VPR_MARK${ifaceMark}"
  1150. iptables -v -t "$(str_to_lower $j)" -S "VPR_MARK${ifaceMark}"
  1151. ifaceMark="$(printf '0x%06x' $((ifaceMark + wanMark)))";
  1152. fi
  1153. i=$((i + 1))
  1154. done
  1155. done
  1156. echo "$_SEPARATOR_"
  1157. echo "Current ipsets"
  1158. ipset save
  1159. if [ -s "$dnsmasqFile" ]; then
  1160. echo "$_SEPARATOR_"
  1161. echo "DNSMASQ ipsets"
  1162. cat "$dnsmasqFile"
  1163. fi
  1164. echo "$_SEPARATOR_"
  1165. } | tee -a /var/${packageName}-support
  1166. if [ -n "$set_p" ]; then
  1167. printf "%b" "Pasting to paste.ee... "
  1168. if is_present 'curl' && is_variant_installed 'libopenssl' && is_installed 'ca-bundle'; then
  1169. json_init; json_add_string "description" "${packageName}-support"
  1170. json_add_array "sections"; json_add_object '0'
  1171. json_add_string "name" "$(uci -q get system.@system[0].hostname)"
  1172. json_add_string "contents" "$(cat /var/${packageName}-support)"
  1173. json_close_object; json_close_array; payload=$(json_dump)
  1174. out=$(curl -s -k "https://api.paste.ee/v1/pastes" -X "POST" -H "Content-Type: application/json" -H "X-Auth-Token:uVOJt6pNqjcEWu7qiuUuuxWQafpHhwMvNEBviRV2B" -d "$payload")
  1175. json_load "$out"; json_get_var id id; json_get_var s success
  1176. [ "$s" = "1" ] && printf "%b" "https://paste.ee/p/$id $__OK__\\n" || printf "%b" "$__FAIL__\\n"
  1177. [ -e "/var/${packageName}-support" ] && rm -f "/var/${packageName}-support"
  1178. else
  1179. printf "%b" "$__FAIL__\\n"
  1180. printf "%b" "$_ERROR_: curl, libopenssl or ca-bundle were not found!\\nRun 'opkg update; opkg install curl libopenssl ca-bundle' to install them.\\n"
  1181. fi
  1182. else
  1183. printf "%b" "Your support details have been logged to '/var/${packageName}-support'. $__OK__\\n"
  1184. fi
  1185. }
  1186. # shellcheck disable=SC2120
  1187. validate_config() {
  1188. uci_validate_section "${packageName}" config "${1}" \
  1189. 'enabled:bool:0' \
  1190. 'strict_enforcement:bool:1' \
  1191. 'ipv6_enabled:bool:0' \
  1192. 'src_ipset:bool:0' \
  1193. 'dest_ipset:bool:0' \
  1194. 'resolver_ipset::or("", "none", "dnsmasq.ipset")' \
  1195. 'verbosity:range(0,2):1' \
  1196. 'wan_tid:integer:201' \
  1197. 'wan_fw_mark:hex(8)' \
  1198. 'fw_mask:hex(8)' \
  1199. 'icmp_interface:string' \
  1200. 'ignored_interface:list(string)' \
  1201. 'supported_interface:list(string)' \
  1202. 'boot_timeout:integer:30' \
  1203. 'iptables_rule_option:or("", "append", "insert")' \
  1204. 'procd_reload_delay:integer:0' \
  1205. 'webui_enable_column:bool:0' \
  1206. 'webui_protocol_column:bool:0' \
  1207. 'webui_supported_protocol:list(string)' \
  1208. 'webui_chain_column:bool:0' \
  1209. 'webui_sorting:bool:1' \
  1210. 'webui_show_ignore_target:bool:0'
  1211. }
  1212. # shellcheck disable=SC2120
  1213. validate_policy() {
  1214. uci_validate_section "${packageName}" policy "${1}" \
  1215. 'name:string' \
  1216. 'enabled:bool:0' \
  1217. 'interface:network' \
  1218. 'proto:or(string)' \
  1219. 'chain:or("", "PREROUTING", "FORWARD", "INPUT", "OUTPUT")' \
  1220. 'src_addr:list(neg(or(host,network,macaddr)))' \
  1221. 'src_port:list(neg(or(portrange, string)))' \
  1222. 'dest_addr:list(neg(host))' \
  1223. 'dest_port:list(neg(or(portrange, string)))'
  1224. }
  1225. # shellcheck disable=SC2120
  1226. validate_include() {
  1227. uci_validate_section "${packageName}" include "${1}" \
  1228. 'path:string' \
  1229. 'enabled:bool:0'
  1230. }