126 lines
2.9 KiB
Go
126 lines
2.9 KiB
Go
package blocker
|
|
|
|
import (
|
|
"fmt"
|
|
"os/exec"
|
|
"strconv"
|
|
|
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
|
)
|
|
|
|
type Firewalld struct {
|
|
logger *logger.Logger
|
|
}
|
|
|
|
func NewFirewalld(logger *logger.Logger) *Firewalld {
|
|
return &Firewalld{
|
|
logger: logger,
|
|
}
|
|
}
|
|
|
|
func (f *Firewalld) Ban(ip string) error {
|
|
err := validateIP(ip)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
cmd := exec.Command("firewall-cmd", "--zone=drop", "--add-source", ip, "--permanent")
|
|
output, err := cmd.CombinedOutput()
|
|
if err != nil {
|
|
f.logger.Error(err.Error())
|
|
return err
|
|
}
|
|
f.logger.Info("Add source " + ip + " " + string(output))
|
|
output, err = exec.Command("firewall-cmd", "--reload").CombinedOutput()
|
|
if err != nil {
|
|
f.logger.Error(err.Error())
|
|
return err
|
|
}
|
|
f.logger.Info("Reload " + string(output))
|
|
return nil
|
|
}
|
|
|
|
func (f *Firewalld) Unban(ip string) error {
|
|
err := validateIP(ip)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
cmd := exec.Command("firewall-cmd", "--zone=drop", "--remove-source", ip, "--permanent")
|
|
output, err := cmd.CombinedOutput()
|
|
if err != nil {
|
|
f.logger.Error(err.Error())
|
|
return err
|
|
}
|
|
f.logger.Info("Remove source " + ip + " " + string(output))
|
|
output, err = exec.Command("firewall-cmd", "--reload").CombinedOutput()
|
|
if err != nil {
|
|
f.logger.Error(err.Error())
|
|
return err
|
|
}
|
|
f.logger.Info("Reload " + string(output))
|
|
return nil
|
|
}
|
|
|
|
func (f *Firewalld) PortOpen(port int, protocol string) error {
|
|
// #nosec G204 - handle is extracted from nftables output and validated
|
|
if port >= 0 && port <= 65535 {
|
|
if protocol != "tcp" && protocol != "udp" {
|
|
f.logger.Error("invalid protocol")
|
|
return fmt.Errorf("invalid protocol")
|
|
}
|
|
s := strconv.Itoa(port)
|
|
cmd := exec.Command(
|
|
"firewall-cmd",
|
|
"--zone=public",
|
|
"--add-port="+s+"/"+protocol,
|
|
"--permanent",
|
|
)
|
|
output, err := cmd.CombinedOutput()
|
|
if err != nil {
|
|
f.logger.Error(err.Error())
|
|
return err
|
|
}
|
|
f.logger.Info("Add port " + s + " " + string(output))
|
|
output, err = exec.Command("firewall-cmd", "--reload").CombinedOutput()
|
|
if err != nil {
|
|
f.logger.Error(err.Error())
|
|
return err
|
|
}
|
|
f.logger.Info("Reload " + string(output))
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (f *Firewalld) PortClose(port int, protocol string) error {
|
|
// #nosec G204 - handle is extracted from nftables output and validated
|
|
if port >= 0 && port <= 65535 {
|
|
if protocol != "tcp" && protocol != "udp" {
|
|
f.logger.Error("invalid protocol")
|
|
return fmt.Errorf("invalid protocol")
|
|
}
|
|
s := strconv.Itoa(port)
|
|
cmd := exec.Command(
|
|
"firewall-cmd",
|
|
"--zone=public",
|
|
"--remove-port="+s+"/"+protocol,
|
|
"--permanent",
|
|
)
|
|
output, err := cmd.CombinedOutput()
|
|
if err != nil {
|
|
f.logger.Error(err.Error())
|
|
return err
|
|
}
|
|
f.logger.Info("Remove port " + s + " " + string(output))
|
|
output, err = exec.Command("firewall-cmd", "--reload").CombinedOutput()
|
|
if err != nil {
|
|
f.logger.Error(err.Error())
|
|
return err
|
|
}
|
|
f.logger.Info("Reload " + string(output))
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (f *Firewalld) Setup(config string) error {
|
|
return nil
|
|
}
|