summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichael Mair-Keimberger <mmk@levelnine.at>2022-10-01 14:17:59 +0200
committerConrad Kostecki <conikost@gentoo.org>2022-10-02 16:42:39 +0200
commitb2f817cba647957defa7ff0f2add91db0f5bc252 (patch)
tree5103fa1f571434c746350427e14af8237aacd463 /net-firewall
parentmedia-sound/mpd: remove unused patch (diff)
downloadgentoo-b2f817cba647957defa7ff0f2add91db0f5bc252.tar.gz
gentoo-b2f817cba647957defa7ff0f2add91db0f5bc252.tar.bz2
gentoo-b2f817cba647957defa7ff0f2add91db0f5bc252.zip
net-firewall/iptables: remove unused file
Signed-off-by: Michael Mair-Keimberger <mmk@levelnine.at> Closes: https://github.com/gentoo/gentoo/pull/27559 Signed-off-by: Conrad Kostecki <conikost@gentoo.org>
Diffstat (limited to 'net-firewall')
-rw-r--r--net-firewall/iptables/files/iptables-r2.init165
1 files changed, 0 insertions, 165 deletions
diff --git a/net-firewall/iptables/files/iptables-r2.init b/net-firewall/iptables/files/iptables-r2.init
deleted file mode 100644
index 3dcabb0dfb41..000000000000
--- a/net-firewall/iptables/files/iptables-r2.init
+++ /dev/null
@@ -1,165 +0,0 @@
-#!/sbin/openrc-run
-# Copyright 1999-2018 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-extra_commands="check save panic"
-extra_started_commands="reload"
-
-iptables_lock_wait_time=${IPTABLES_LOCK_WAIT_TIME:-"60"}
-iptables_lock_wait_interval=${IPTABLES_LOCK_WAIT_INTERVAL:-"1000"}
-
-iptables_name=${SVCNAME}
-case ${iptables_name} in
- iptables|ip6tables) ;;
- *) iptables_name="iptables" ;;
-esac
-
-iptables_bin="/sbin/${iptables_name}"
-case ${iptables_name} in
- iptables) iptables_proc="/proc/net/ip_tables_names"
- iptables_save=${IPTABLES_SAVE};;
- ip6tables) iptables_proc="/proc/net/ip6_tables_names"
- iptables_save=${IP6TABLES_SAVE};;
-esac
-
-depend() {
- need localmount #434774
- before net
-}
-
-set_table_policy() {
- local has_errors=0 chains table=$1 policy=$2
- case ${table} in
- nat) chains="PREROUTING POSTROUTING OUTPUT";;
- mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";;
- filter) chains="INPUT FORWARD OUTPUT";;
- *) chains="";;
- esac
-
- local chain
- for chain in ${chains} ; do
- ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -t ${table} -P ${chain} ${policy}
- [ $? -ne 0 ] && has_errors=1
- done
-
- return ${has_errors}
-}
-
-checkkernel() {
- if [ ! -e ${iptables_proc} ] ; then
- eerror "Your kernel lacks ${iptables_name} support, please load"
- eerror "appropriate modules and try again."
- return 1
- fi
- return 0
-}
-
-checkconfig() {
- if [ -z "${iptables_save}" -o ! -f "${iptables_save}" ] ; then
- eerror "Not starting ${iptables_name}. First create some rules then run:"
- eerror "/etc/init.d/${iptables_name} save"
- return 1
- fi
- return 0
-}
-
-start_pre() {
- checkconfig || return 1
-}
-
-start() {
- ebegin "Loading ${iptables_name} state and starting firewall"
- ${iptables_bin}-restore --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
- eend $?
-}
-
-stop_pre() {
- checkkernel || return 1
-}
-
-stop() {
- if [ "${SAVE_ON_STOP}" = "yes" ] ; then
- save || return 1
- fi
-
- ebegin "Stopping firewall"
- local has_errors=0 a
- for a in $(cat ${iptables_proc}) ; do
- set_table_policy $a ACCEPT
- [ $? -ne 0 ] && has_errors=1
-
- ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a
- [ $? -ne 0 ] && has_errors=1
-
- ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a
- [ $? -ne 0 ] && has_errors=1
- done
- eend ${has_errors}
-}
-
-reload() {
- checkkernel || return 1
- checkrules || return 1
- ebegin "Flushing firewall"
- local has_errors=0 a
- for a in $(cat ${iptables_proc}) ; do
- ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a
- [ $? -ne 0 ] && has_errors=1
-
- ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a
- [ $? -ne 0 ] && has_errors=1
- done
- eend ${has_errors}
-
- start
-}
-
-checkrules() {
- ebegin "Checking rules"
- ${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
- eend $?
-}
-
-check() {
- # Short name for users of init.d script.
- checkrules
-}
-
-save() {
- ebegin "Saving ${iptables_name} state"
- checkpath -q -d "$(dirname "${iptables_save}")"
- checkpath -q -m 0600 -f "${iptables_save}"
- ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
- eend $?
-}
-
-panic() {
- # use iptables autoload capability to load at least all required
- # modules and filter table
- ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -S >/dev/null
- if [ $? -ne 0 ] ; then
- eerror "${iptables_bin} failed to load"
- return 1
- fi
-
- if service_started ${iptables_name}; then
- rc-service ${iptables_name} stop
- fi
-
- local has_errors=0 a
- ebegin "Dropping all packets"
- for a in $(cat ${iptables_proc}) ; do
- ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a
- [ $? -ne 0 ] && has_errors=1
-
- ${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a
- [ $? -ne 0 ] && has_errors=1
-
- if [ "${a}" != "nat" ]; then
- # The "nat" table is not intended for filtering, the use of DROP is therefore inhibited.
- set_table_policy $a DROP
- [ $? -ne 0 ] && has_errors=1
- fi
- done
- eend ${has_errors}
-}