treewide: move freifunk-related packages to separate repo
[oweals/luci.git] / contrib / package / meshwizard / files / usr / bin / meshwizard / helpers / setup_firewall.sh
diff --git a/contrib/package/meshwizard/files/usr/bin/meshwizard/helpers/setup_firewall.sh b/contrib/package/meshwizard/files/usr/bin/meshwizard/helpers/setup_firewall.sh
deleted file mode 100755 (executable)
index 154b2b6..0000000
+++ /dev/null
@@ -1,145 +0,0 @@
-#!/bin/sh
-# Add "freifunk" firewall zone
-# If wan/lan is used for olsr then remove these networks from wan/lan zones
-# Also setup rules defined in /etc/config/freifunk and /etc/config/profile_<community>
-
-. /lib/functions.sh
-. $dir/functions.sh
-
-wan_is_olsr=$(uci -q get meshwizard.netconfig.wan_config)
-
-config_load firewall
-
-# Rename firewall zone for freifunk if unnamed
-# If wan is used for olsr then set network for the firewall zone wan to ' ' to remove the wan interface from it, else add local restrict to it
-# If lan is used for olsr then set network for the firewall zone lan to ' ' to remove the lan interface from it
-
-handle_fwzone() {
-       config_get name "$1" name
-       config_get network "$1" network
-
-       if [ "$name" == "freifunk" ]; then
-               # rename section if unnamed
-               if [ -z "${1/cfg[0-9a-fA-F]*/}" ]; then
-                       section_rename firewall $1 zone_freifunk
-               fi
-       fi
-
-       if [ "$name" == "wan" ]; then
-               if  [ "$wan_is_olsr" == 1 ]; then
-                       uci set firewall.$1.network=' ' && uci_commitverbose "WAN is used for olsr, removed the wan interface from zone wan" firewall
-               else
-                       uci set firewall.$1.local_restrict=1 && uci_commitverbose "Enable local_restrict for zone wan" firewall
-               fi
-       fi
-
-       if [ "$name" == "lan" ] && [ "$lan_is_olsr" == "1" ]; then
-                       uci set firewall.$1.network=' ' && uci_commitverbose "LAN is used for olsr, removed the lan interface from zone lan" firewall
-       fi
-}
-
-config_foreach handle_fwzone zone
-
-uci batch << EOF
-       set firewall.zone_freifunk="zone"
-       set firewall.zone_freifunk.name="freifunk"
-       set firewall.zone_freifunk.input="$zone_freifunk_input"
-       set firewall.zone_freifunk.forward="$zone_freifunk_forward"
-       set firewall.zone_freifunk.output="$zone_freifunk_output"
-EOF
-
-uci_commitverbose "Setup firewall zones" firewall
-
-# Usually we need to setup masquerading for lan, except lan is an olsr interface or has an olsr hna-entry
-
-handle_interface() {
-        config_get interface "$1" interface
-        if [ "$interface" == "lan" ]; then
-                no_masq_lan=1
-        fi
-}
-config_load olsrd
-config_foreach handle_interface Interface
-
-LANIP="$(uci -q get network.lan.ipaddr)"
-if [ -n "$LANIP" ]; then
-       handle_hna() {
-               config_get netaddr "$1" netaddr
-                       if [ "$LANIP" == "$netaddr" ]; then
-                       no_masq_lan=1
-               fi
-       }
-       config_foreach handle_hna Hna4
-fi
-
-currms=$(uci -q get firewall.zone_freifunk.masq_src)
-if [ ! "$no_masq_lan" == "1" ] && [ ! "$(uci -q get meshwizard.netconfig.lan_config)" == 1 ]; then
-       uci set firewall.zone_freifunk.masq="1"
-       [ -z "$(echo $currms |grep lan)" ] && uci add_list firewall.zone_freifunk.masq_src="lan"
-fi
-
-
-# Rules, Forwardings, advanced config and includes from freifunk and
-# profile_$community config files.
-
-add_fw_rules() {
-    config_cb() {
-       local type="$1"
-       local name="$2"
-       local allowed_section_types="advanced include fw_rule fw_forwarding"
-       if is_in_list "$allowed_section_types" $type ; then
-           uci set firewall.${name}="${type/fw_/}"
-           option_cb() {
-               local option="$1"
-               local value="$2"
-               uci set firewall.${CONFIG_SECTION}.${option}="$value"
-           }
-       else
-           option_cb() { return; }
-       fi
-    }
-    config_load freifunk
-    config_load profile_${community}
-}
-add_fw_rules
-
-
-# If we use auto-ipv6-dhcp then allow 547/udp on the freifunk zone
-if [ "$ipv6_config" = "auto-ipv6-dhcpv6" ]; then
-       uci batch <<- EOF
-               set firewall.dhcpv6=rule
-               set firewall.dhcpv6.src=freifunk
-               set firewall.dhcpv6.target=ACCEPT
-               set firewall.dhcpv6.dest_port=547
-               set firewall.dhcpv6.proto=udp
-       EOF
-fi
-
-# Firewall rules to allow incoming ssh and web if enabled
-
-if [ "$wan_allowssh" == 1 ]; then
-       uci batch <<- EOF
-               set firewall.wanssh=rule
-               set firewall.wanssh.src=wan
-               set firewall.wanssh.target=ACCEPT
-               set firewall.wanssh.proto=tcp
-               set firewall.wanssh.dest_port=22
-       EOF
-fi
-
-if [ "$wan_allowweb" == 1 ]; then
-       uci batch <<- EOF
-               set firewall.wanweb=rule
-               set firewall.wanweb.src=wan
-               set firewall.wanweb.target=ACCEPT
-               set firewall.wanweb.proto=tcp
-               set firewall.wanweb.dest_port=80
-               set firewall.wanwebhttps=rule
-               set firewall.wanwebhttps.src=wan
-               set firewall.wanwebhttps.target=ACCEPT
-               set firewall.wanwebhttps.proto=tcp
-               set firewall.wanwebhttps.dest_port=443
-       EOF
-fi
-
-uci_commitverbose "Setup rules, forwardings, advanced config and includes." firewall