define Package/libcyassl-luci
$(call Package/cyassl-luci/Default)
- SECTION:=libs
- SUBMENU:=SSL
- CATEGORY:=Libraries
+ SECTION:=luci
+ CATEGORY:=LuCI
+ SUBMENU:=Libraries
TITLE+= (library)
endef
--- /dev/null
+#
+# Copyright (C) 2009 Jo-Philipp Wich <xm@subsignal.org>
+#
+# This is free software, licensed under the Apache 2.0 license.
+#
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=freifunk-firewall
+PKG_RELEASE:=1
+
+PKG_BUILD_DIR := $(BUILD_DIR)/$(PKG_NAME)
+
+include $(INCLUDE_DIR)/package.mk
+
+define Package/freifunk-firewall
+ SECTION:=luci
+ CATEGORY:=LuCI
+ SUBMENU:=Freifunk
+ TITLE:=Freifunk Firewall Addon
+ DEPENDS:=+firewall
+endef
+
+define Package/freifunk-firewall/description
+ Various firewall extensions for Freifunk. Includes NAT fixes and advanced settings.
+endef
+
+define Build/Prepare
+ mkdir -p $(PKG_BUILD_DIR)
+endef
+
+define Build/Configure
+endef
+
+define Build/Compile
+endef
+
+define Package/freifunk-firewall/postinst
+#!/bin/sh
+
+if ! grep -q /etc/firewall.freifunk /etc/config/firewall; then
+ uci add firewall include >/dev/null
+ uci set firewall.@include[-1].path=/etc/firewall.freifunk
+ uci commit firewall
+fi
+endef
+
+define Package/freifunk-firewall/install
+ $(CP) ./files/* $(1)/
+endef
+
+$(eval $(call BuildPackage,freifunk-firewall))
--- /dev/null
+#!/bin/sh
+# Freifunk Firewall addons
+# $Id$
+
+
+#
+# Apply advanced settings
+#
+apply_advanced() {
+ local tcp_ecn
+ local tcp_window_scaling
+ local accept_redirects
+ local accept_source_route
+
+ config_get_bool tcp_ecn $1 tcp_ecn 1
+ config_get ip_conntrack_max $1 ip_conntrack_max
+ config_get_bool tcp_westwood $1 tcp_westwood 0
+ config_get_bool tcp_window_scaling $1 tcp_window_scaling 1
+ config_get_bool accept_redirects $1 accept_redirects 0
+ config_get_bool accept_source_route $1 accept_source_route 0
+
+ logger -t firewall.freifunk "tcp_ecn is $tcp_ecn"
+ logger -t firewall.freifunk "tcp_window_scaling is $tcp_window_scaling"
+ logger -t firewall.freifunk "accept_redirects is $accept_redirects"
+ logger -t firewall.freifunk "accept_source_route is $accept_source_route"
+
+ sysctl -w net.ipv4.tcp_ecn=$tcp_ecn >/dev/null
+ sysctl -w net.ipv4.tcp_window_scaling=$tcp_window_scaling >/dev/null
+ sysctl -w net.ipv4.tcp_westwood=$tcp_westwood >/dev/null
+ sysctl -w net.ipv4.ip_conntrack_max=$ip_conntrack_max >/dev/null
+
+ for f in /proc/sys/net/ipv4/conf/*/accept_redirects; do
+ echo $accept_redirects > $f
+ done
+
+ for f in /proc/sys/net/ipv4/conf/*/accept_source_route; do
+ echo $accept_source_route > $f
+ done
+}
+
+config_foreach apply_advanced advanced
+
+
+#
+# Apply fixes for masquerading rules
+#
+apply_nat_fix() {
+ local up
+ local ifname
+ config_get up $1 up
+ [ -n "$up" ] || return 0
+ (ACTION="ifup" INTERFACE="$1" . /etc/hotplug.d/iface/22-firewall-nat-fix )
+}
+
+uci_set_state firewall core loaded 1
+config_foreach fw_addif interface
+config_foreach apply_nat_fix interface
+
+[ -x /etc/init.d/luci_splash ] && ( sleep 3; /etc/init.d/luci_splash restart )&
+
+[ -x /etc/init.d/freifunk-p2pblock ] && /etc/init.d/freifunk-p2pblock enabled && \
+ ( sleep 3; /etc/init.d/freifunk-p2pblock restart )&
--- /dev/null
+. /lib/firewall/uci_firewall.sh
+unset ZONE
+config_get ifname $INTERFACE ifname
+[ "$ifname" == "lo" ] && exit 0
+
+load_zones() {
+ local name
+ local network
+ config_get name $1 name
+ config_get network $1 network
+ [ -z "$network" ] && network=$name
+ for n in $network; do
+ [ "$n" = "$INTERFACE" ] && ZONE="$ZONE $name"
+ done
+}
+
+config_foreach load_zones zone
+
+[ -z "$ZONE" ] && exit 0
+
+natfix_addr_add() {
+ local network=$1
+ local iface=$2
+
+ config_get parent "$1" interface
+ [ "$network" != "$INTERFACE" -a "$parent" != "$INTERFACE" ] && return 0
+
+ config_get ipaddr "$network" ipaddr
+ [ -n "$ipaddr" ] || return 0
+ config_get netmask "$network" netmask
+ [ -n "$netmask" ] || return 0
+ eval "$(ipcalc.sh $ipaddr $netmask)"
+
+ logger -t firewall.freifunk "adding nat rule for $iface($NETWORK/$PREFIX)"
+ iptables -t nat -A "natfix_$iface" -s "$NETWORK/$PREFIX" -d "$NETWORK/$PREFIX" -j ACCEPT
+}
+
+[ ifup = "$ACTION" ] && {
+ iptables -t nat -N "natfix_$ifname"
+ natfix_addr_add "$INTERFACE" "$ifname"
+ config_foreach natfix_addr_add alias "$ifname"
+
+ for z in $ZONE; do
+ local loaded
+ config_get loaded core loaded
+ [ -n "$loaded" ] && {
+ logger -t firewall.freifunk "applying nat rules on zone $z"
+ iptables -t nat -I "zone_${z}_nat" 1 -o "$ifname" -j "natfix_$ifname"
+ }
+ done
+}
+
+[ ifdown = "$ACTION" ] && {
+ for z in $ZONE; do
+ local up
+ config_get up $z up
+ iptables -t nat -D "zone_${z}_nat" -o "$ifname" -j "natfix_$ifname" 2>/dev/null
+ done
+ iptables -t nat -F "natfix_$ifname" 2>/dev/null
+ iptables -t nat -X "natfix_$ifname" 2>/dev/null
+}
include $(INCLUDE_DIR)/package.mk
define Package/freifunk-p2pblock
- SECTION:=net
- CATEGORY:=Network
+ SECTION:=luci
+ CATEGORY:=LuCI
+ SUBMENU:=Freifunk
TITLE:=Freifunk p2pblock Addon
DEPENDS:=+iptables-mod-filter +l7-protocols +iptables-mod-conntrack-extra
endef
include $(INCLUDE_DIR)/package.mk
define Package/freifunk-watchdog
- SECTION:=utils
- CATEGORY:=Utilities
+ SECTION:=luci
+ CATEGORY:=LuCI
+ SUBMENU:=Freifunk
TITLE:=Freifunk Ad-Hoc watchdog daemon
DEPENDS:=libuci
endef
### Templates ###
define Package/luci/libtemplate
- SECTION:=admin
- CATEGORY:=Administration
+ SECTION:=luci
+ CATEGORY:=LuCI
TITLE:=LuCI - Lua Configuration Interface
URL:=http://luci.freifunk-halle.net/
MAINTAINER:=Steven Barth <steven-at-midlink-dot-org>
- SUBMENU:=LuCI Libraries
+ SUBMENU:=Libraries
DEPENDS:=+luci-core
endef
define Package/luci/fftemplate
$(call Package/luci/libtemplate)
- SUBMENU:=LuCI Freifunk Support
+ SUBMENU:=Freifunk
DEPENDS:=+luci-mod-freifunk
endef
define Package/luci/i18ntemplate
$(call Package/luci/libtemplate)
- SUBMENU:=LuCI Translations
+ SUBMENU:=Translations
DEPENDS:=+luci-web
endef
define Package/luci/thtemplate
$(call Package/luci/libtemplate)
- SUBMENU:=LuCI Themes
+ SUBMENU:=Themes
DEPENDS:=+luci-web
endef
define Package/luci/webtemplate
$(call Package/luci/libtemplate)
- SUBMENU:=LuCI Components
+ SUBMENU:=Components
endef
define Package/luci-mod-freifunk
$(call Package/luci/fftemplate)
- DEPENDS:=+luci-admin-full +luci-json
+ DEPENDS:=+luci-admin-full +luci-json +PACKAGE_luci-mod-freifunk:freifunk-firewall
TITLE:=LuCI Freifunk module
endef
define Package/olsrd-luci/common_info
- SECTION:=net
- CATEGORY:=Network
+ SECTION:=luci
+ CATEGORY:=LuCI
+ SUBMENU:=Freifunk
TITLE:=OLSR - Optimized Link State Routing Daemon
URL:=http://www.olsr.org/
MAINTAINER:=Jo-Philipp Wich <xm@subsignal.org>
$(eval $(call Download,tzcode))
define Package/zoneinfo/default
- SUBMENU:=Zones (ZoneInfo)
+ SUBMENU:=ZoneInfo
TITLE:=Zone Information
- SECTION:=net
- CATEGORY:=Network
+ SECTION:=luci
+ CATEGORY:=LuCI
endef
define Package/zoneinfo-core
+++ /dev/null
-#!/bin/sh
-# Freifunk Firewall addons
-# $Id$
-
-
-#
-# Apply advanced settings
-#
-apply_advanced() {
- local tcp_ecn
- local tcp_window_scaling
- local accept_redirects
- local accept_source_route
-
- config_get_bool tcp_ecn $1 tcp_ecn 1
- config_get ip_conntrack_max $1 ip_conntrack_max
- config_get_bool tcp_westwood $1 tcp_westwood 0
- config_get_bool tcp_window_scaling $1 tcp_window_scaling 1
- config_get_bool accept_redirects $1 accept_redirects 0
- config_get_bool accept_source_route $1 accept_source_route 0
-
- logger -t firewall.freifunk "tcp_ecn is $tcp_ecn"
- logger -t firewall.freifunk "tcp_window_scaling is $tcp_window_scaling"
- logger -t firewall.freifunk "accept_redirects is $accept_redirects"
- logger -t firewall.freifunk "accept_source_route is $accept_source_route"
-
- sysctl -w net.ipv4.tcp_ecn=$tcp_ecn >/dev/null
- sysctl -w net.ipv4.tcp_window_scaling=$tcp_window_scaling >/dev/null
- sysctl -w net.ipv4.tcp_westwood=$tcp_westwood >/dev/null
- sysctl -w net.ipv4.ip_conntrack_max=$ip_conntrack_max >/dev/null
-
- for f in /proc/sys/net/ipv4/conf/*/accept_redirects; do
- echo $accept_redirects > $f
- done
-
- for f in /proc/sys/net/ipv4/conf/*/accept_source_route; do
- echo $accept_source_route > $f
- done
-}
-
-config_foreach apply_advanced advanced
-
-
-#
-# Apply fixes for masquerading rules
-#
-apply_nat_fix() {
- local up
- local ifname
- config_get up $1 up
- [ -n "$up" ] || return 0
- (ACTION="ifup" INTERFACE="$1" . /etc/hotplug.d/iface/22-firewall-nat-fix )
-}
-
-uci_set_state firewall core loaded 1
-config_foreach fw_addif interface
-config_foreach apply_nat_fix interface
-
-[ -x /etc/init.d/luci_splash ] && ( sleep 3; /etc/init.d/luci_splash restart )&
-
-[ -x /etc/init.d/freifunk-p2pblock ] && /etc/init.d/freifunk-p2pblock enabled && \
- ( sleep 3; /etc/init.d/freifunk-p2pblock restart )&
+++ /dev/null
-. /lib/firewall/uci_firewall.sh
-unset ZONE
-config_get ifname $INTERFACE ifname
-[ "$ifname" == "lo" ] && exit 0
-
-load_zones() {
- local name
- local network
- config_get name $1 name
- config_get network $1 network
- [ -z "$network" ] && network=$name
- for n in $network; do
- [ "$n" = "$INTERFACE" ] && ZONE="$ZONE $name"
- done
-}
-
-config_foreach load_zones zone
-
-[ -z "$ZONE" ] && exit 0
-
-natfix_addr_add() {
- local network=$1
- local iface=$2
-
- config_get parent "$1" interface
- [ "$network" != "$INTERFACE" -a "$parent" != "$INTERFACE" ] && return 0
-
- config_get ipaddr "$network" ipaddr
- [ -n "$ipaddr" ] || return 0
- config_get netmask "$network" netmask
- [ -n "$netmask" ] || return 0
- eval "$(ipcalc.sh $ipaddr $netmask)"
-
- logger -t firewall.freifunk "adding nat rule for $iface($NETWORK/$PREFIX)"
- iptables -t nat -A "natfix_$iface" -s "$NETWORK/$PREFIX" -d "$NETWORK/$PREFIX" -j ACCEPT
-}
-
-[ ifup = "$ACTION" ] && {
- iptables -t nat -N "natfix_$ifname"
- natfix_addr_add "$INTERFACE" "$ifname"
- config_foreach natfix_addr_add alias "$ifname"
-
- for z in $ZONE; do
- local loaded
- config_get loaded core loaded
- [ -n "$loaded" ] && {
- logger -t firewall.freifunk "applying nat rules on zone $z"
- iptables -t nat -I "zone_${z}_nat" 1 -o "$ifname" -j "natfix_$ifname"
- }
- done
-}
-
-[ ifdown = "$ACTION" ] && {
- for z in $ZONE; do
- local up
- config_get up $z up
- iptables -t nat -D "zone_${z}_nat" -o "$ifname" -j "natfix_$ifname" 2>/dev/null
- done
- iptables -t nat -F "natfix_$ifname" 2>/dev/null
- iptables -t nat -X "natfix_$ifname" 2>/dev/null
-}