X-Git-Url: http://git.ipfire.org/?a=blobdiff_plain;f=html%2Fcgi-bin%2Faliases.cgi;h=4e61eb65e6cd1b87667a29e897f4bd120c9b9f80;hb=f93238725f2f73975dff1a2c67820d9480a100e6;hp=b87afdd93ecaa21f15da3a7fef0ad80f71bbb907;hpb=c7edc1c70a5565cbb28a87c650b7cbb735923300;p=people%2Fpmueller%2Fipfire-2.x.git diff --git a/html/cgi-bin/aliases.cgi b/html/cgi-bin/aliases.cgi index b87afdd93e..4e61eb65e6 100644 --- a/html/cgi-bin/aliases.cgi +++ b/html/cgi-bin/aliases.cgi @@ -33,6 +33,14 @@ use strict; require '/var/ipfire/general-functions.pl'; # replace /var/ipcop with /var/ipcop in case of manual install require "${General::swroot}/lang.pl"; require "${General::swroot}/header.pl"; +require "${General::swroot}/ids-functions.pl"; + +my $configfwdfw = "${General::swroot}/firewall/config"; +my $configinput = "${General::swroot}/firewall/input"; +my $configoutgoing = "${General::swroot}/firewall/outgoing"; +my %input=(); +my %forward=(); +my %output=(); #workaround to suppress a warning when a variable is used only once my @dummy = ( ${Header::colouryellow} ); @@ -90,7 +98,6 @@ if ($settings{'ACTION'} eq $Lang::tr{'save'}) { # #Validate static Settings1 here # - unless ($errormessage) { # Everything is ok, save settings #map (delete ($settings{$_}) ,(@nosaved,'ACTION','KEY1'));# Must never be saved #&General::writehash($setting, \%settings); # Save good settings @@ -99,6 +106,9 @@ if ($settings{'ACTION'} eq $Lang::tr{'save'}) { # Rebuild configuration file if needed &BuildConfiguration; + + # Handle suricata related actions. + &HandleSuricata(); } ERROR: # Leave the faulty field untouched @@ -133,6 +143,9 @@ if ($settings{'ACTION'} eq $Lang::tr{'toggle enable disable'}) { # Rebuild configuration file &BuildConfiguration; + + # Handle Suricata related actions. + &HandleSuricata(); } if ($settings{'ACTION'} eq $Lang::tr{'add'}) { @@ -146,6 +159,12 @@ if ($settings{'ACTION'} eq $Lang::tr{'add'}) { $errormessage = $Lang::tr{'duplicate ip'} . ' (RED)'; $spacer=" & "; } + #Check if we have an emtpy name + if (!$settings{'NAME'}){ + $errormessage=$Lang::tr{'fwhost err name1'}; + }elsif(! &General::validfqdn($settings{'NAME'}) && ! &General::validhostname($settings{'NAME'})){ + $errormessage=$Lang::tr{'invalid hostname'}; + } my $idx=0; foreach my $line (@current) { chomp ($line); @@ -162,6 +181,38 @@ if ($settings{'ACTION'} eq $Lang::tr{'add'}) { } $idx++; } + #Update firewallrules if aliasname is changed + if ($settings{'OLDNAME'} ne $settings {'NAME'}){ + &General::readhasharray("$configfwdfw", \%forward); + &General::readhasharray("$configinput", \%input); + &General::readhasharray("$configoutgoing", \%output); + #Check FORWARD + foreach my $forwardkey (sort keys %forward){ + if ($forward{$forwardkey}[29] eq $settings{'OLDNAME'}){ + $forward{$forwardkey}[29] = $settings {'NAME'}; + } + } + &General::writehasharray($configfwdfw, \%forward); + #Check INPUT + foreach my $inputkey (sort keys %input){ + if ($input{$inputkey}[6] eq $settings{'OLDNAME'}){ + $input{$inputkey}[6] = $settings {'NAME'}; + } + } + &General::writehasharray($configinput, \%input); + #Check OUTPUT + foreach my $outputkey (sort keys %output){ + if ($output{$outputkey}[4] eq $settings{'OLDNAME'}){ + $output{$outputkey}[4] = $settings {'NAME'}; + } + } + &General::writehasharray($configoutgoing, \%output); + &General::firewall_config_changed; + } + #If Alias IP has changed, set firewall_config_changed + if($settings{'OLDIP'} ne $settings{'IP'} && $settings{'OLDIP'}){ + &General::firewall_config_changed; + } unless ($errormessage) { if ($settings{'KEY1'} eq '') { #add or edit ? unshift (@current, "$settings{'IP'},$settings{'ENABLED'},$settings{'NAME'}\n"); @@ -176,6 +227,9 @@ if ($settings{'ACTION'} eq $Lang::tr{'add'}) { &SortDataFile; # sort newly added/modified entry &BuildConfiguration; # then re-build conf which use new data + + # Handle Suricata related actions. + &HandleSuricata(); ## ## if entering data line is repetitive, choose here to not erase fields between each addition @@ -207,6 +261,9 @@ if ($settings{'ACTION'} eq $Lang::tr{'remove'}) { &General::log($Lang::tr{'ip alias removed'}); &BuildConfiguration; # then re-build conf which use new data + + # Handle Suricata related actions. + &HandleSuricata(); } @@ -241,16 +298,16 @@ my %checked =(); # Checkbox manipulations if ($errormessage) { &Header::openbox('100%', 'left', $Lang::tr{'error messages'}); - print "$errormessage "; + print "$errormessage "; &Header::closebox(); } unless (( $netsettings{'CONFIG_TYPE'} =~ /^(1|2|3|4)$/ ) && ($netsettings{'RED_TYPE'} eq 'STATIC')) { &Header::openbox('100%', 'left', $Lang::tr{'capswarning'}); print < + - +
$Lang::tr{'aliases not active'}$Lang::tr{'aliases not active'}
END @@ -275,23 +332,23 @@ if ($settings{'KEY1'} ne '') { print < - + + +
- + - + - +
$Lang::tr{'name'}: *$Lang::tr{'name'}: $Lang::tr{'alias ip'}: $Lang::tr{'alias ip'}:  $Lang::tr{'enabled'} $Lang::tr{'enabled'} 
+

- +
- - - +
* $Lang::tr{'this field may be blank'} -
@@ -320,11 +377,11 @@ if ($netsettings{'SORT_ALIASES'} eq 'NAMERev') { # &Header::openbox('100%', 'left', $Lang::tr{'current aliases'}); print < + - - - + + + END ; @@ -354,21 +411,19 @@ foreach my $line (@current) { #Colorize each line if ($settings{'KEY1'} eq $key) { - print ""; - $col="bgcolor='${Header::colouryellow}'"; + $col="background-color:${Header::colouryellow};"; } elsif ($key % 2) { - print ""; - $col="bgcolor='${Header::table2colour}'"; + $col="background-color:${Header::table2colour};"; } else { - print ""; - $col="bgcolor='${Header::table1colour}'"; + $col="background-color:${Header::table1colour};"; } + print ""; print <$temp[2] - + + - - -
$Lang::tr{'name'} $sortarrow1$Lang::tr{'alias ip'} $sortarrow2$Lang::tr{'action'}$Lang::tr{'name'} $sortarrow1$Lang::tr{'alias ip'} $sortarrow2$Lang::tr{'action'}
$temp[0]$temp[2]$temp[0] +
@@ -376,7 +431,7 @@ foreach my $line (@current) {
+
@@ -384,7 +439,7 @@ foreach my $line (@current) {
+
@@ -514,3 +569,17 @@ sub BuildConfiguration { # Restart service associated with this system '/usr/local/bin/setaliases'; } + +# +## Handle Suricata related actions. +# +sub HandleSuricata() { + # Check if suricata is running. + if(&IDS::ids_is_running()) { + # Re-generate file which contains the HOME_NET declaration. + &IDS::generate_home_net_file(); + + # Call suricatactrl to perform a restart of suricata. + &IDS::call_suricatactrl("restart"); + } +}