def _GET(self, *param, **params): host_id = self.chk_hostby1(param) if host_id is None: return web.notfound() self.view.host_id = host_id kit = KaresansuiIpTables() if os.path.exists(kit.firewall_xml_file) is False: self.view.have_config = False else: self.view.have_config = True kit.firewall_xml = kit.read_firewall_xml() for chain in kit.basic_chains['filter']: try: policy = kit.firewall_xml['filter'][chain]['policy'] except: policy = 'ACCEPT' chain = chain.lower() exec("self.view.%s_policy_ACCEPT_checked = ''" % chain) exec("self.view.%s_policy_DROP_checked = ''" % chain) exec("self.view.%s_policy_REJECT_checked = ''" % chain) if policy == 'REJECT': exec("self.view.%s_policy = 'REJECT'" % chain) exec("self.view.%s_policy_REJECT_checked = 'checked'" % chain) elif policy == 'DROP': exec("self.view.%s_policy = 'DROP'" % chain) exec("self.view.%s_policy_DROP_checked = 'checked'" % chain) self.view.base_policy_DROP_checked = 'checked' else: exec("self.view.%s_policy = 'ACCEPT'" % chain) exec("self.view.%s_policy_ACCEPT_checked = 'checked'" % chain) self.view.iptables = Storage( is_running=kit.is_running(), is_configured=kit.is_configured(), ) self.view.targets = kit.basic_targets['filter'] return True
def _GET(self, *param, **params): host_id = self.chk_hostby1(param) if host_id is None: return web.notfound() self.view.host_id = host_id kit = KaresansuiIpTables() if os.path.exists(kit.firewall_xml_file) is False: self.view.have_config = False else: self.view.have_config = True kit.firewall_xml = kit.read_firewall_xml() for chain in kit.basic_chains['filter']: try: policy = kit.firewall_xml['filter'][chain]['policy'] except: policy = 'ACCEPT' chain = chain.lower() exec("self.view.%s_policy_ACCEPT_checked = ''" % chain) exec("self.view.%s_policy_DROP_checked = ''" % chain) exec("self.view.%s_policy_REJECT_checked = ''" % chain) if policy == 'REJECT': exec("self.view.%s_policy = 'REJECT'" % chain) exec("self.view.%s_policy_REJECT_checked = 'checked'" % chain) elif policy == 'DROP': exec("self.view.%s_policy = 'DROP'" % chain) exec("self.view.%s_policy_DROP_checked = 'checked'" % chain) self.view.base_policy_DROP_checked = 'checked'; else: exec("self.view.%s_policy = 'ACCEPT'" % chain) exec("self.view.%s_policy_ACCEPT_checked = 'checked'" % chain) self.view.iptables = Storage( is_running=kit.is_running(), is_configured=kit.is_configured(), ) self.view.targets = kit.basic_targets['filter'] return True
def _GET(self, *param, **params): host_id = self.chk_hostby1(param) if host_id is None: return web.notfound() self.view.host_id = host_id kit = KaresansuiIpTables() if os.path.exists(kit.firewall_xml_file) is False: self.view.have_config = False else: kit.firewall_xml = kit.read_firewall_xml() # -- self.view.iptables = Storage( is_running=kit.is_running(), is_configured=kit.is_configured(), ) self.view.have_config = True if self.is_mode_input() is True: self.view.default_rule_id = len(kit.get_rules()) + 1 self.view.targets = kit.basic_targets['filter'] self.view.protocols = kit.chain_protos devtype_regexs = { "phy":"^(lo|eth)", "vir":"^(xenbr|virbr|vif|veth)", } devtype_phy_regex = re.compile(r"%s" % devtype_regexs['phy']) devtype_vir_regex = re.compile(r"%s" % devtype_regexs['vir']) devs = {} devs['phy'] = [] devs['vir'] = [] devs['oth'] = [] cidrs = [] ips = [] for dev,dev_info in get_ifconfig_info().iteritems(): try: if devtype_phy_regex.match(dev): devs['phy'].append(dev) elif devtype_vir_regex.match(dev): devs['vir'].append(dev) else: devs['oth'].append(dev) if dev_info['ipaddr'] is not None: if not dev_info['ipaddr'] in ips: ips.append(dev_info['ipaddr']) if dev_info['cidr'] is not None: if not dev_info['cidr'] in cidrs: cidrs.append(dev_info['cidr']) except: pass devs['phy'].sort() devs['vir'].sort() devs['oth'].sort() self.view.devs = [{'Physical' : devs['phy']}, {'Virtual' : devs['vir']}, {'Other' : devs['oth']}, ] self.view.cidrs = cidrs self.view.ips = ips # -- return True
def _GET(self, *param, **params): host_id = self.chk_hostby1(param) if host_id is None: return web.notfound() self.view.host_id = host_id kit = KaresansuiIpTables() if os.path.exists(kit.firewall_xml_file) is False: self.view.have_config = False else: kit.firewall_xml = kit.read_firewall_xml() # -- self.view.iptables = Storage( is_running=kit.is_running(), is_configured=kit.is_configured(), ) self.view.have_config = True if self.is_mode_input() is True: self.view.default_rule_id = len(kit.get_rules()) + 1 self.view.targets = kit.basic_targets['filter'] self.view.protocols = kit.chain_protos devtype_regexs = { "phy": "^(lo|eth)", "vir": "^(xenbr|virbr|vif|veth)", } devtype_phy_regex = re.compile(r"%s" % devtype_regexs['phy']) devtype_vir_regex = re.compile(r"%s" % devtype_regexs['vir']) devs = {} devs['phy'] = [] devs['vir'] = [] devs['oth'] = [] cidrs = [] ips = [] for dev, dev_info in get_ifconfig_info().iteritems(): try: if devtype_phy_regex.match(dev): devs['phy'].append(dev) elif devtype_vir_regex.match(dev): devs['vir'].append(dev) else: devs['oth'].append(dev) if dev_info['ipaddr'] is not None: if not dev_info['ipaddr'] in ips: ips.append(dev_info['ipaddr']) if dev_info['cidr'] is not None: if not dev_info['cidr'] in cidrs: cidrs.append(dev_info['cidr']) except: pass devs['phy'].sort() devs['vir'].sort() devs['oth'].sort() self.view.devs = [ { 'Physical': devs['phy'] }, { 'Virtual': devs['vir'] }, { 'Other': devs['oth'] }, ] self.view.cidrs = cidrs self.view.ips = ips # -- return True