From: Stefan Schantl <stefan.schantl@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH 09/12] rules.pl: Do not try to restore the same ipset multiple times.
Date: Thu, 17 Feb 2022 06:35:39 +0100 [thread overview]
Message-ID: <b28694d9499e8dd2717f05ff1c9b65ede8fa6afc.camel@ipfire.org> (raw)
In-Reply-To: <4657F2F3-0D35-4232-88EC-B6B4DDD5BCEB@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 6929 bytes --]
Hello Michael,
thanks for reviewing and your feedback.
You are absolutely right, it would give us much cleaner code when
moving this kind of check into the ipset_restore() function.
I'll send a patch for this.
Best regards,
-Stefan
> Hello,
>
> I would have implemented this differently.
>
> Would it not be better to perform the check in ipset_restore() so
> that you won’t have to copy the code to everywhere you call
> ipset_restore?
>
> This solution bloats the code slightly.
>
> -Michael
>
> > On 14 Feb 2022, at 18:42, Stefan Schantl
> > <stefan.schantl(a)ipfire.org> wrote:
> >
> > When an ipset list get restored, this now will be documented in a
> > hash
> > and this hash also will be checked before restoring a list if this
> > has
> > not be done previously.
> >
> > This will prevent from restoring the same list multiple times.
> >
> > Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
> > ---
> > config/firewall/rules.pl | 31 +++++++++++++++++++++++++------
> > 1 file changed, 25 insertions(+), 6 deletions(-)
> >
> > diff --git a/config/firewall/rules.pl b/config/firewall/rules.pl
> > index d533ffb42..29990ee67 100644
> > --- a/config/firewall/rules.pl
> > +++ b/config/firewall/rules.pl
> > @@ -70,6 +70,7 @@ my %confignatfw=();
> > my %locationsettings = (
> > "LOCATIONBLOCK_ENABLED" => "off"
> > );
> > +my %loaded_ipset_lists=();
> >
> > my @p2ps=();
> >
> > @@ -405,8 +406,14 @@ sub buildrules {
> > # Grab location
> > code from hash.
> > my $loc_src =
> > $$hash{$key}[4];
> >
> > - # Call function to
> > load the networks list for this country.
> > -
> > &ipset_restore($loc_s
> > rc);
> > + # Check if the
> > network list for this country already has been loaded.
> > + unless($loaded_ipse
> > t_lists{$loc_src}) {
> > + # Call
> > function to load the networks list for this country.
> > + &ipset_rest
> > ore($loc_src);
> > +
> > + # Store to
> > the hash that this list has been loaded.
> > + $loaded_ips
> > et_lists{$loc_src} = "1";
> > + }
> >
> > push(@source_option
> > s, $source);
> > } elsif($source) {
> > @@ -419,8 +426,14 @@ sub buildrules {
> > # Grab location
> > code from hash.
> > my $loc_dst =
> > $$hash{$key}[6];
> >
> > - # Call function to
> > load the networks list for this country.
> > -
> > &ipset_restore($loc_d
> > st);
> > + # Check if the
> > network list for this country already has been loaded.
> > + unless($loaded_ipse
> > t_lists{$loc_dst}) {
> > + # Call
> > function to load the networks list for this country.
> > + &ipset_rest
> > ore($loc_dst);
> > +
> > + # Store to
> > the hash that this list has been loaded.
> > + $loaded_ips
> > et_lists{$loc_dst} = "1";
> > + }
> >
> > push(@destination_o
> > ptions, $destination);
> > } elsif ($destination) {
> > @@ -683,8 +696,14 @@ sub locationblock {
> > # is enabled.
> > foreach my $location (@locations) {
> > if(exists $locationsettings{$location} &&
> > $locationsettings{$location} eq "on") {
> > - # Call function to load the networks list
> > for this country.
> > - &ipset_restore($location);
> > + # Check if the network list for this
> > country already has been loaded.
> > + unless($loaded_ipset_lists{$location}) {
> > + # Call function to load the
> > networks list for this country.
> > + &ipset_restore($location);
> > +
> > + # Store to the hash that this list
> > has been loaded.
> > + $loaded_ipset_lists{$location} =
> > "1";
> > + }
> >
> > # Call iptables and create rule to use the
> > loaded ipset list.
> > run("$IPTABLES -A LOCATIONBLOCK -m set --
> > match-set CC_$location src -j DROP");
> > --
> > 2.30.2
> >
>
next prev parent reply other threads:[~2022-02-17 5:35 UTC|newest]
Thread overview: 41+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-02-14 18:42 [PATCH 01/12] location-functions.pl: Rename and set the location for exported databases to "/var/lib/location/ipset/" Stefan Schantl
2022-02-14 18:42 ` [PATCH 02/12] location-functions.pl: Remove ending backslash from location_dir variable Stefan Schantl
2022-02-14 21:01 ` Peter Müller
2022-02-14 18:42 ` [PATCH 03/12] rules.pl: Move flush of LOCATIONBLOCK into main flush() function Stefan Schantl
2022-02-14 21:02 ` Peter Müller
2022-02-15 12:42 ` Michael Tremer
2022-02-14 18:42 ` [PATCH 04/12] rules.pl: Destroy all ipset lists on rule reload Stefan Schantl
2022-02-14 21:02 ` Peter Müller
2022-02-15 12:41 ` Michael Tremer
2022-02-15 19:28 ` Tim FitzGeorge
2022-02-16 10:45 ` Michael Tremer
2022-02-17 4:56 ` Stefan Schantl
2022-02-27 14:28 ` Stefan Schantl
2022-02-14 18:42 ` [PATCH 05/12] rules.pl: Add tiny ipset_restore function Stefan Schantl
2022-02-14 21:03 ` Peter Müller
2022-02-15 12:41 ` Michael Tremer
2022-02-14 18:42 ` [PATCH 06/12] rules.pl: Move to ipset based data for LOCATIONBLOCK feature Stefan Schantl
2022-02-14 21:03 ` Peter Müller
2022-02-15 12:40 ` Michael Tremer
2022-02-14 18:42 ` [PATCH 07/12] rules.pl: Move to ipset based data for location based firewall rules Stefan Schantl
2022-02-14 21:05 ` Peter Müller
2022-02-15 12:40 ` Michael Tremer
2022-02-14 18:42 ` [PATCH 08/12] update-location-database: Export database to ipset compatible format now Stefan Schantl
2022-02-14 21:05 ` Peter Müller
2022-02-15 12:39 ` Michael Tremer
2022-02-14 18:42 ` [PATCH 09/12] rules.pl: Do not try to restore the same ipset multiple times Stefan Schantl
2022-02-14 21:05 ` Peter Müller
2022-02-15 12:39 ` Michael Tremer
2022-02-17 5:35 ` Stefan Schantl [this message]
2022-02-17 5:40 ` [PATCH] rules.pl: Adjust check against loading the same lists " Stefan Schantl
2022-02-17 19:25 ` Peter Müller
2022-02-14 18:42 ` [PATCH 10/12] rules.pl: Check if an ipset db file exists before call to restore it Stefan Schantl
2022-02-14 21:06 ` Peter Müller
2022-02-15 12:38 ` Michael Tremer
2022-02-14 18:42 ` [PATCH 11/12] rules.pl: Add workaround to hide a warning about an only once used variable Stefan Schantl
2022-02-14 21:07 ` Peter Müller
2022-02-15 12:37 ` Michael Tremer
2022-02-14 18:42 ` [PATCH 12/12] libloc: Export DB in ipset compatible format Stefan Schantl
2022-02-14 21:06 ` Peter Müller
2022-02-15 12:37 ` Michael Tremer
2022-02-14 21:01 ` [PATCH 01/12] location-functions.pl: Rename and set the location for exported databases to "/var/lib/location/ipset/" Peter Müller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=b28694d9499e8dd2717f05ff1c9b65ede8fa6afc.camel@ipfire.org \
--to=stefan.schantl@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox