| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Bison; |
|
2
|
|
|
|
|
|
|
|
|
3
|
|
|
|
|
|
|
=head1 NAME |
|
4
|
|
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
Bison - IPTables Script generator |
|
6
|
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
8
|
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
Bison can be used to generate a firewall script for your Linux box. It doesn't run the commands for you |
|
10
|
|
|
|
|
|
|
but generates the needed commands for you to run based on the methods you pass. It's also a lot of |
|
11
|
|
|
|
|
|
|
fun to build them. |
|
12
|
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
14
|
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
The synopsis is basic. All the methods have been exported. So a simple firewall script would be: |
|
16
|
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
use Bison; |
|
18
|
|
|
|
|
|
|
|
|
19
|
|
|
|
|
|
|
override_global({ip_address => '10.1.1.5'}); |
|
20
|
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
# drop everything by default |
|
22
|
|
|
|
|
|
|
default_policy({ |
|
23
|
|
|
|
|
|
|
INPUT => 'DROP', |
|
24
|
|
|
|
|
|
|
FORWARD => 'DROP' |
|
25
|
|
|
|
|
|
|
OUTPUT => 'ACCEPT', |
|
26
|
|
|
|
|
|
|
}); |
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
# filter bad tcp packets into a special chain |
|
29
|
|
|
|
|
|
|
drop_bad_tcp_flags(); |
|
30
|
|
|
|
|
|
|
|
|
31
|
|
|
|
|
|
|
# create a custom chain and set default behaviour to drop |
|
32
|
|
|
|
|
|
|
chain ('new', { |
|
33
|
|
|
|
|
|
|
name => 'my_firewall', |
|
34
|
|
|
|
|
|
|
jump => 'DROP', |
|
35
|
|
|
|
|
|
|
}); |
|
36
|
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
# setup logging for the new chain |
|
38
|
|
|
|
|
|
|
log_setup ('my_firewall', { time => 7, duration => 'minute', prefix => 'My Cool Firewall' }); |
|
39
|
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
bison_finish(); |
|
41
|
|
|
|
|
|
|
|
|
42
|
|
|
|
|
|
|
Obviously the above script would lock you out of your system. But it shows it's a lot easier to write a bit |
|
43
|
|
|
|
|
|
|
of Perl than remember long-winded IPTables commands. |
|
44
|
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
=cut |
|
46
|
|
|
|
|
|
|
|
|
47
|
1
|
|
|
1
|
|
23270
|
use warnings; |
|
|
1
|
|
|
|
|
3
|
|
|
|
1
|
|
|
|
|
39
|
|
|
48
|
1
|
|
|
1
|
|
6
|
use strict; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
38
|
|
|
49
|
1
|
|
|
1
|
|
26
|
use 5.010; |
|
|
1
|
|
|
|
|
9
|
|
|
|
1
|
|
|
|
|
64
|
|
|
50
|
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
$Bison::VERSION = '0.05'; |
|
52
|
|
|
|
|
|
|
|
|
53
|
1
|
|
|
1
|
|
6
|
use vars qw/$bopts/; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
123
|
|
|
54
|
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
our $bopts = { |
|
56
|
|
|
|
|
|
|
ipt => '/sbin/iptables', |
|
57
|
|
|
|
|
|
|
dry => 0, |
|
58
|
|
|
|
|
|
|
iface => 'eth0', |
|
59
|
|
|
|
|
|
|
ip_is => 'dynamic', |
|
60
|
|
|
|
|
|
|
errors => [], |
|
61
|
|
|
|
|
|
|
buffer => [], |
|
62
|
|
|
|
|
|
|
chains => [], |
|
63
|
|
|
|
|
|
|
firewall => 'bison', |
|
64
|
|
|
|
|
|
|
}; |
|
65
|
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
initfw(); # call initfw to setup main chains |
|
67
|
|
|
|
|
|
|
|
|
68
|
1
|
|
|
1
|
|
6
|
use base 'Exporter'; |
|
|
1
|
|
|
|
|
2
|
|
|
|
1
|
|
|
|
|
2049
|
|
|
69
|
|
|
|
|
|
|
our @EXPORT = qw/ |
|
70
|
|
|
|
|
|
|
initfw |
|
71
|
|
|
|
|
|
|
flush |
|
72
|
|
|
|
|
|
|
override_global |
|
73
|
|
|
|
|
|
|
getvars |
|
74
|
|
|
|
|
|
|
default_policy |
|
75
|
|
|
|
|
|
|
bison_finish |
|
76
|
|
|
|
|
|
|
source_nat |
|
77
|
|
|
|
|
|
|
preroute |
|
78
|
|
|
|
|
|
|
chain |
|
79
|
|
|
|
|
|
|
log_setup |
|
80
|
|
|
|
|
|
|
accept_local |
|
81
|
|
|
|
|
|
|
accept_all_from |
|
82
|
|
|
|
|
|
|
drop_bad_tcp_flags |
|
83
|
|
|
|
|
|
|
drop_icmp |
|
84
|
|
|
|
|
|
|
open_service |
|
85
|
|
|
|
|
|
|
enable_ip_forwarding |
|
86
|
|
|
|
|
|
|
drop_netbios |
|
87
|
|
|
|
|
|
|
enable_state_matching |
|
88
|
|
|
|
|
|
|
forward |
|
89
|
|
|
|
|
|
|
/; |
|
90
|
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
=head2 initfw |
|
92
|
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
This function should be called before anything else. |
|
94
|
|
|
|
|
|
|
It sets up the default firewall chain and a catchall filter. |
|
95
|
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
=cut |
|
97
|
|
|
|
|
|
|
|
|
98
|
|
|
|
|
|
|
sub initfw { |
|
99
|
1
|
|
|
1
|
1
|
4
|
my $args = shift; |
|
100
|
|
|
|
|
|
|
# create main bison chain |
|
101
|
1
|
|
|
|
|
12
|
chain('new', { name => $bopts->{firewall}, jump => 'drop' }); |
|
102
|
1
|
|
|
|
|
7
|
log_setup($bopts->{firewall}); |
|
103
|
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
# now the catchall filter, known as dropwall |
|
105
|
1
|
|
|
|
|
7
|
chain('new', { name => 'dropwall', jump => 'drop'}); |
|
106
|
1
|
|
|
|
|
5
|
log_setup('dropwall', { prefix => 'Bison DropWall'}); |
|
107
|
|
|
|
|
|
|
|
|
108
|
|
|
|
|
|
|
# silent logging chain for all those annoying things |
|
109
|
1
|
|
|
|
|
4
|
chain('new', { name => 'silent', jump => 'drop'}); |
|
110
|
|
|
|
|
|
|
} |
|
111
|
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
sub has_ip_address { |
|
113
|
0
|
0
|
|
0
|
0
|
0
|
if (! defined $bopts->{ip_address}) { |
|
114
|
0
|
|
|
|
|
0
|
die "Can't continue. No IP Address set. Please set one with override_globals({ip_address => '0.0.0.0'})\n"; |
|
115
|
|
|
|
|
|
|
} |
|
116
|
|
|
|
|
|
|
} |
|
117
|
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
=head2 forward |
|
119
|
|
|
|
|
|
|
|
|
120
|
|
|
|
|
|
|
Handles all forwarding related stuff. ie: Forward packets from an internal network (eth1) to the internet (eth0). |
|
121
|
|
|
|
|
|
|
|
|
122
|
|
|
|
|
|
|
# generate something like iptables -A FORWARD -i eth0 -o eth1 -m state --state ESTABLISHED,RELATED -j ACCEPT |
|
123
|
|
|
|
|
|
|
forward({ |
|
124
|
|
|
|
|
|
|
from => 'eth1', |
|
125
|
|
|
|
|
|
|
to => 'eth0', |
|
126
|
|
|
|
|
|
|
type => 'related' |
|
127
|
|
|
|
|
|
|
}); |
|
128
|
|
|
|
|
|
|
|
|
129
|
|
|
|
|
|
|
# .. or simply just forward the packets from eth1 to eth0 |
|
130
|
|
|
|
|
|
|
forward({ from => 'eth1', to => 'eth0' }); |
|
131
|
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
=cut |
|
133
|
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
sub forward { |
|
135
|
0
|
|
|
0
|
1
|
0
|
my $args = shift; |
|
136
|
|
|
|
|
|
|
|
|
137
|
0
|
|
|
|
|
0
|
my ($from, $to, $type); |
|
138
|
0
|
|
|
|
|
0
|
for(keys %$args) { |
|
139
|
0
|
0
|
|
|
|
0
|
$from = $args->{$_} if $_ eq 'from'; |
|
140
|
0
|
0
|
|
|
|
0
|
$to = $args->{$_} if $_ eq 'to'; |
|
141
|
0
|
0
|
|
|
|
0
|
$type = $args->{$_} if $_ eq 'type'; |
|
142
|
|
|
|
|
|
|
} |
|
143
|
|
|
|
|
|
|
|
|
144
|
0
|
0
|
0
|
|
|
0
|
if (! $from || ! $to) { |
|
145
|
0
|
|
|
|
|
0
|
log_error('forward(): From and To need to be set to forward packets'); |
|
146
|
0
|
|
|
|
|
0
|
return 0; |
|
147
|
|
|
|
|
|
|
} |
|
148
|
|
|
|
|
|
|
|
|
149
|
0
|
|
|
|
|
0
|
ipt("-A FORWARD -i $from -o $to -j ACCEPT"); |
|
150
|
0
|
0
|
|
|
|
0
|
if ($type) { |
|
151
|
0
|
0
|
0
|
|
|
0
|
if ($type eq 'related' || $type eq 'established') { |
|
152
|
0
|
|
|
|
|
0
|
ipt("-A FORWARD -i $to -o $from -m state --state ESTABLISHED,RELATED -j ACCEPT"); |
|
153
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -i $to -m state --state ESTABLISHED,RELATED -j ACCEPT"); |
|
154
|
|
|
|
|
|
|
} |
|
155
|
|
|
|
|
|
|
} |
|
156
|
|
|
|
|
|
|
} |
|
157
|
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
=head2 drop_bad_tcp_flags |
|
159
|
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
Catches any malicious TCP packets into a badflags chain, then prefixes the log as that chain. |
|
161
|
|
|
|
|
|
|
Should help prevent force fragment and XMAS packets. Also checks to make sure new TCP connections |
|
162
|
|
|
|
|
|
|
are SYN packets. |
|
163
|
|
|
|
|
|
|
This section could do with a bit more work, but this is still a beta release :) |
|
164
|
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
=cut |
|
166
|
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
sub drop_bad_tcp_flags { |
|
168
|
0
|
|
|
0
|
1
|
0
|
my ($chain, $prefix) = @_; |
|
169
|
|
|
|
|
|
|
|
|
170
|
0
|
|
0
|
|
|
0
|
$chain = $chain||'badflags'; |
|
171
|
0
|
|
0
|
|
|
0
|
$prefix = $prefix||'Bison BadFlags'; |
|
172
|
0
|
|
|
|
|
0
|
($bopts->{badflags}, $bopts->{badflags_prefix}) = ($chain, $prefix); |
|
173
|
|
|
|
|
|
|
# create a chain to handle them |
|
174
|
0
|
|
|
|
|
0
|
chain('new', { name => $chain, jump => 'drop' }); |
|
175
|
|
|
|
|
|
|
|
|
176
|
|
|
|
|
|
|
# add alert options with defaults |
|
177
|
0
|
|
|
|
|
0
|
log_setup($chain, { prefix => $prefix}); |
|
178
|
|
|
|
|
|
|
|
|
179
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p tcp ! --syn -m state --state NEW -j $chain"); |
|
180
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -f -j $chain"); |
|
181
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p tcp --tcp-flags ALL FIN,URG,PSH -j $chain"); |
|
182
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p tcp --tcp-flags ALL ALL -j $chain"); |
|
183
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j $chain"); |
|
184
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p tcp --tcp-flags ALL NONE -j $chain"); |
|
185
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j $chain"); |
|
186
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j $chain"); |
|
187
|
0
|
|
|
|
|
0
|
return 1; |
|
188
|
|
|
|
|
|
|
} |
|
189
|
|
|
|
|
|
|
|
|
190
|
|
|
|
|
|
|
=head2 open_service |
|
191
|
|
|
|
|
|
|
|
|
192
|
|
|
|
|
|
|
Open ports to a service by name (www, ssh, ftp). If no arguments are passed |
|
193
|
|
|
|
|
|
|
it will open access to everyone. If you pass a hash with to => then the port |
|
194
|
|
|
|
|
|
|
will be only available to that ip address. |
|
195
|
|
|
|
|
|
|
|
|
196
|
|
|
|
|
|
|
open_service('ssh', { to => '10.1.1.5' }); # open 22 to 10.1.1.5 only |
|
197
|
|
|
|
|
|
|
open_service('www'); # open port 80 to all |
|
198
|
|
|
|
|
|
|
|
|
199
|
|
|
|
|
|
|
=cut |
|
200
|
|
|
|
|
|
|
|
|
201
|
|
|
|
|
|
|
sub open_service { |
|
202
|
0
|
|
|
0
|
1
|
0
|
my ($service, $args) = @_; |
|
203
|
|
|
|
|
|
|
|
|
204
|
0
|
|
|
|
|
0
|
my @services = qw/ssh www ftp/; |
|
205
|
0
|
0
|
|
|
|
0
|
if (! grep { $_ eq $service } @services) { |
|
|
0
|
|
|
|
|
0
|
|
|
206
|
0
|
|
|
|
|
0
|
log_error("open_service: No such service $service"); |
|
207
|
0
|
|
|
|
|
0
|
return 0; |
|
208
|
|
|
|
|
|
|
} |
|
209
|
|
|
|
|
|
|
|
|
210
|
0
|
|
|
|
|
0
|
my ($to, $port); |
|
211
|
0
|
|
|
|
|
0
|
for(keys %$args) { |
|
212
|
0
|
0
|
|
|
|
0
|
$to = $args->{$_} if $_ eq 'to'; |
|
213
|
|
|
|
|
|
|
} |
|
214
|
|
|
|
|
|
|
|
|
215
|
0
|
|
|
|
|
0
|
given(lc $service) { |
|
216
|
0
|
|
|
|
|
0
|
when ('ssh') { $port = 22; } |
|
|
0
|
|
|
|
|
0
|
|
|
217
|
0
|
|
|
|
|
0
|
when ('www') { $port = 80; } |
|
|
0
|
|
|
|
|
0
|
|
|
218
|
0
|
|
|
|
|
0
|
when ('ftp') { $port = '20:21'; } |
|
|
0
|
|
|
|
|
0
|
|
|
219
|
|
|
|
|
|
|
} |
|
220
|
|
|
|
|
|
|
|
|
221
|
0
|
0
|
|
|
|
0
|
if ($to) { ipt("-A INPUT -i $bopts->{iface} -s $to -d 0/0 -p tcp --dport $port -j ACCEPT"); } |
|
|
0
|
|
|
|
|
0
|
|
|
222
|
0
|
|
|
|
|
0
|
else { ipt("-A INPUT -i $bopts->{iface} -s 0/0 -d 0/0 -p tcp --dport $port -j ACCEPT"); } |
|
223
|
|
|
|
|
|
|
|
|
224
|
0
|
|
|
|
|
0
|
return 1; |
|
225
|
|
|
|
|
|
|
} |
|
226
|
|
|
|
|
|
|
|
|
227
|
|
|
|
|
|
|
=head2 drop_icmp |
|
228
|
|
|
|
|
|
|
|
|
229
|
|
|
|
|
|
|
Drops all ICMP requests, but opens a few by default. |
|
230
|
|
|
|
|
|
|
If you pass an array it will only allow what is requested |
|
231
|
|
|
|
|
|
|
|
|
232
|
|
|
|
|
|
|
drop_icmp( [qw/0 8 11/] ); |
|
233
|
|
|
|
|
|
|
|
|
234
|
|
|
|
|
|
|
=cut |
|
235
|
|
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
sub drop_icmp { |
|
237
|
0
|
|
|
0
|
1
|
0
|
my $args = shift; |
|
238
|
|
|
|
|
|
|
|
|
239
|
|
|
|
|
|
|
# drop all icmp requests, except a few |
|
240
|
|
|
|
|
|
|
# 0 - Echo Reply |
|
241
|
|
|
|
|
|
|
# 3 - Destination Unreachable |
|
242
|
|
|
|
|
|
|
# 11 - Time Exceeded |
|
243
|
|
|
|
|
|
|
# 8 - Echo |
|
244
|
0
|
0
|
|
|
|
0
|
if ($args) { |
|
245
|
0
|
0
|
|
|
|
0
|
if (ref $args eq 'ARRAY') { |
|
246
|
0
|
|
|
|
|
0
|
for (@$args) { |
|
247
|
0
|
0
|
|
|
|
0
|
if ($_ == 8) { ipt("-A INPUT -p icmp --icmp-type 8 -m limit --limit 1/second -j ACCEPT"); next; } |
|
|
0
|
|
|
|
|
0
|
|
|
|
0
|
|
|
|
|
0
|
|
|
248
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p icmp --icmp-type $_ -j ACCEPT"); |
|
249
|
|
|
|
|
|
|
} |
|
250
|
|
|
|
|
|
|
} |
|
251
|
|
|
|
|
|
|
} |
|
252
|
|
|
|
|
|
|
else { |
|
253
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p icmp --icmp-type 0 -j ACCEPT"); |
|
254
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p icmp --icmp-type 3 -j ACCEPT"); |
|
255
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p icmp --icmp-type 11 -j ACCEPT"); |
|
256
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p icmp --icmp-type 8 -m limit --limit 1/second -j ACCEPT"); |
|
257
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p icmp -j $bopts->{firewall}"); |
|
258
|
|
|
|
|
|
|
} |
|
259
|
0
|
|
|
|
|
0
|
return 1; |
|
260
|
|
|
|
|
|
|
} |
|
261
|
|
|
|
|
|
|
|
|
262
|
|
|
|
|
|
|
=head2 chain_list |
|
263
|
|
|
|
|
|
|
=cut |
|
264
|
|
|
|
|
|
|
|
|
265
|
|
|
|
|
|
|
=head2 chain |
|
266
|
|
|
|
|
|
|
|
|
267
|
|
|
|
|
|
|
Perform chain events. |
|
268
|
|
|
|
|
|
|
|
|
269
|
|
|
|
|
|
|
chain('new', { name => 'my_new_chain', jump => 'drop' }); |
|
270
|
|
|
|
|
|
|
chain('list') # returns an array of chains you have created |
|
271
|
|
|
|
|
|
|
|
|
272
|
|
|
|
|
|
|
=cut |
|
273
|
|
|
|
|
|
|
|
|
274
|
|
|
|
|
|
|
sub chain { |
|
275
|
3
|
|
|
3
|
1
|
8
|
my ($do, $args) = @_; |
|
276
|
|
|
|
|
|
|
|
|
277
|
3
|
50
|
|
|
|
10
|
if ($do eq 'new') { |
|
|
|
0
|
|
|
|
|
|
|
278
|
3
|
50
|
|
|
|
12
|
if (! defined $args->{name}) { |
|
279
|
0
|
|
|
|
|
0
|
log_error('chan(): No name supplied'); |
|
280
|
0
|
|
|
|
|
0
|
return 0; |
|
281
|
|
|
|
|
|
|
} |
|
282
|
|
|
|
|
|
|
|
|
283
|
3
|
|
|
|
|
7
|
my $chain = $args->{name}; |
|
284
|
3
|
|
|
|
|
34
|
ipt("-N $chain"); |
|
285
|
3
|
50
|
|
|
|
8
|
if ($args) { |
|
286
|
3
|
|
|
|
|
11
|
for (keys %$args) { |
|
287
|
6
|
100
|
|
|
|
18
|
if ($_ eq 'jump') { |
|
288
|
3
|
|
|
|
|
9
|
my $jump = uc $args->{$_}; |
|
289
|
3
|
|
|
|
|
9
|
ipt("-A $chain -j $jump"); |
|
290
|
|
|
|
|
|
|
} |
|
291
|
|
|
|
|
|
|
} |
|
292
|
|
|
|
|
|
|
} |
|
293
|
3
|
|
|
|
|
15
|
push(@{$bopts->{chains}}, $chain); |
|
|
3
|
|
|
|
|
8
|
|
|
294
|
|
|
|
|
|
|
} |
|
295
|
|
|
|
|
|
|
elsif ($do eq 'list') { |
|
296
|
0
|
|
|
|
|
0
|
return @{$bopts->{chains}}; |
|
|
0
|
|
|
|
|
0
|
|
|
297
|
|
|
|
|
|
|
} |
|
298
|
|
|
|
|
|
|
else { |
|
299
|
0
|
|
|
|
|
0
|
log_error("chain(): No such option '$do'"); |
|
300
|
0
|
|
|
|
|
0
|
return 0; |
|
301
|
|
|
|
|
|
|
} |
|
302
|
|
|
|
|
|
|
|
|
303
|
3
|
|
|
|
|
5
|
return 1; |
|
304
|
|
|
|
|
|
|
} |
|
305
|
|
|
|
|
|
|
|
|
306
|
|
|
|
|
|
|
=head2 drop_netbios |
|
307
|
|
|
|
|
|
|
|
|
308
|
|
|
|
|
|
|
We don't necessarily want netbios packets, so here's the |
|
309
|
|
|
|
|
|
|
option to disable them. |
|
310
|
|
|
|
|
|
|
You can choose to log them silently, or loudly to the main |
|
311
|
|
|
|
|
|
|
firewall chain. |
|
312
|
|
|
|
|
|
|
|
|
313
|
|
|
|
|
|
|
drop_netbios(); # drop netbios silently |
|
314
|
|
|
|
|
|
|
drop_netbios(1); # drop packets loudly by logging to firewall |
|
315
|
|
|
|
|
|
|
|
|
316
|
|
|
|
|
|
|
=cut |
|
317
|
|
|
|
|
|
|
|
|
318
|
|
|
|
|
|
|
sub drop_netbios { |
|
319
|
0
|
|
|
0
|
1
|
0
|
my $loud = shift; |
|
320
|
|
|
|
|
|
|
|
|
321
|
0
|
|
|
|
|
0
|
my $chain = 'silent'; |
|
322
|
0
|
0
|
|
|
|
0
|
if ($loud) { $chain = $bopts->{firewall}; } |
|
|
0
|
|
|
|
|
0
|
|
|
323
|
|
|
|
|
|
|
|
|
324
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -p udp --sport 137 --dport 137 -j $chain"); |
|
325
|
0
|
|
|
|
|
0
|
return 1; |
|
326
|
|
|
|
|
|
|
} |
|
327
|
|
|
|
|
|
|
|
|
328
|
|
|
|
|
|
|
=head2 log_setup |
|
329
|
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
Sets up logging for a chain. You can specify the time, duration and prefix. |
|
331
|
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
log_setup ('mychain', { time => 8, duration => 'minute', prefix => 'MyChain Log'}); |
|
333
|
|
|
|
|
|
|
# 8 alerts per minute |
|
334
|
|
|
|
|
|
|
|
|
335
|
|
|
|
|
|
|
=cut |
|
336
|
|
|
|
|
|
|
|
|
337
|
|
|
|
|
|
|
sub log_setup { |
|
338
|
2
|
|
|
2
|
1
|
5
|
my ($chain, $args) = @_; |
|
339
|
|
|
|
|
|
|
|
|
340
|
2
|
50
|
|
|
|
6
|
$chain = 'INPUT' if ! defined $chain; |
|
341
|
2
|
|
|
|
|
4
|
my $prefix = 'Bison'; # default log prefix :D |
|
342
|
2
|
|
|
|
|
3
|
my $time = 15; |
|
343
|
2
|
|
|
|
|
2
|
my $duration = 'minute'; |
|
344
|
|
|
|
|
|
|
|
|
345
|
2
|
|
|
|
|
8
|
for(keys %$args) { |
|
346
|
1
|
50
|
|
|
|
4
|
$prefix = $args->{$_} if $_ eq 'prefix'; |
|
347
|
1
|
50
|
|
|
|
3
|
$time = $args->{$_} if $_ eq 'time'; |
|
348
|
1
|
50
|
|
|
|
6
|
$duration = $args->{$_} if $_ eq 'duration'; |
|
349
|
|
|
|
|
|
|
} |
|
350
|
|
|
|
|
|
|
|
|
351
|
2
|
|
|
|
|
13
|
ipt("-A $chain -m limit --limit $time/$duration -j LOG --log-prefix [$prefix]"); |
|
352
|
2
|
|
|
|
|
4
|
return 1; |
|
353
|
|
|
|
|
|
|
} |
|
354
|
|
|
|
|
|
|
|
|
355
|
|
|
|
|
|
|
=head2 source_nat |
|
356
|
|
|
|
|
|
|
|
|
357
|
|
|
|
|
|
|
Sources everything going out the interface to be the given IP address. |
|
358
|
|
|
|
|
|
|
|
|
359
|
|
|
|
|
|
|
source_nat({ as => '10.1.1.5'}); |
|
360
|
|
|
|
|
|
|
|
|
361
|
|
|
|
|
|
|
=cut |
|
362
|
|
|
|
|
|
|
|
|
363
|
|
|
|
|
|
|
sub source_nat { |
|
364
|
0
|
|
|
0
|
1
|
0
|
my (%args) = @_; |
|
365
|
|
|
|
|
|
|
|
|
366
|
0
|
|
|
|
|
0
|
has_ip_address(); |
|
367
|
|
|
|
|
|
|
|
|
368
|
0
|
|
|
|
|
0
|
my $ip_is = $bopts->{ip_is}; |
|
369
|
0
|
0
|
|
|
|
0
|
if (%args) { $ip_is = $args{as}; } |
|
|
0
|
|
|
|
|
0
|
|
|
370
|
|
|
|
|
|
|
|
|
371
|
0
|
0
|
|
|
|
0
|
if ($ip_is eq 'static') { ipt("-t nat -A POSTROUTING -o $bopts->{iface} -j SNAT --to $bopts->{ip_address}"); } |
|
|
0
|
0
|
|
|
|
0
|
|
|
372
|
0
|
|
|
|
|
0
|
elsif ($ip_is eq 'dynamic') { ipt("-t nat -A POSTROUTING -o $bopts->{iface} -j MASQUERADE"); } |
|
373
|
|
|
|
|
|
|
else { |
|
374
|
0
|
|
|
|
|
0
|
log_error("Unknown IP Address type in source_nat: $ip_is"); |
|
375
|
0
|
|
|
|
|
0
|
return 0; |
|
376
|
|
|
|
|
|
|
} |
|
377
|
|
|
|
|
|
|
|
|
378
|
0
|
|
|
|
|
0
|
return 1; |
|
379
|
|
|
|
|
|
|
} |
|
380
|
|
|
|
|
|
|
|
|
381
|
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
sub getvars { |
|
383
|
1
|
|
|
1
|
|
6224
|
use Data::Dumper; |
|
|
1
|
|
|
|
|
18281
|
|
|
|
1
|
|
|
|
|
1921
|
|
|
384
|
0
|
|
|
0
|
0
|
0
|
say Dumper($bopts); |
|
385
|
|
|
|
|
|
|
} |
|
386
|
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
=head2 override_global |
|
388
|
|
|
|
|
|
|
|
|
389
|
|
|
|
|
|
|
Overrides any default settings, and allows you to create new ones. |
|
390
|
|
|
|
|
|
|
|
|
391
|
|
|
|
|
|
|
override_global({ iface => eth0, ip_address => '10.1.1.6'}); |
|
392
|
|
|
|
|
|
|
|
|
393
|
|
|
|
|
|
|
=cut |
|
394
|
|
|
|
|
|
|
|
|
395
|
|
|
|
|
|
|
sub override_global { |
|
396
|
0
|
|
|
0
|
1
|
0
|
my $opt = shift; |
|
397
|
0
|
|
|
|
|
0
|
for (keys %$opt) { |
|
398
|
0
|
|
|
|
|
0
|
say "-> Global override: $_ => $opt->{$_}"; |
|
399
|
0
|
|
|
|
|
0
|
$bopts->{$_} = $opt->{$_}; |
|
400
|
|
|
|
|
|
|
} |
|
401
|
|
|
|
|
|
|
} |
|
402
|
|
|
|
|
|
|
|
|
403
|
|
|
|
|
|
|
=head2 preroute |
|
404
|
|
|
|
|
|
|
|
|
405
|
|
|
|
|
|
|
Preroute options. ie: route an incoming port to a specified IP in the nat |
|
406
|
|
|
|
|
|
|
|
|
407
|
|
|
|
|
|
|
preroute('ports', { ports => '22:25', proto => 'tcp', to => '10.1.1.9' }); |
|
408
|
|
|
|
|
|
|
|
|
409
|
|
|
|
|
|
|
=cut |
|
410
|
|
|
|
|
|
|
|
|
411
|
|
|
|
|
|
|
sub preroute { |
|
412
|
0
|
|
|
0
|
1
|
0
|
my ($what, $args) = @_; |
|
413
|
|
|
|
|
|
|
|
|
414
|
0
|
0
|
|
|
|
0
|
if ($what eq 'ports') { |
|
415
|
0
|
|
|
|
|
0
|
my ($proto, $ports, $to); |
|
416
|
0
|
|
|
|
|
0
|
for (keys %$args) { |
|
417
|
0
|
0
|
|
|
|
0
|
$to = $args->{$_} if $_ eq 'to'; |
|
418
|
0
|
0
|
|
|
|
0
|
$ports = $args->{$_} if $_ eq 'ports'; |
|
419
|
0
|
0
|
|
|
|
0
|
$proto = $args->{$_} if $_ eq 'proto'; |
|
420
|
|
|
|
|
|
|
} |
|
421
|
|
|
|
|
|
|
|
|
422
|
0
|
0
|
0
|
|
|
0
|
if ((! $to || ! $ports)) { |
|
423
|
0
|
|
|
|
|
0
|
log_error("Prerouting ports needs to and ports attributes"); |
|
424
|
0
|
|
|
|
|
0
|
return; |
|
425
|
|
|
|
|
|
|
} |
|
426
|
|
|
|
|
|
|
|
|
427
|
0
|
0
|
0
|
|
|
0
|
if ((! defined $proto || $proto eq 'all')) { |
|
428
|
0
|
|
|
|
|
0
|
ipt("-t nat -A PREROUTING -i $bopts->{iface} -p tcp --dport $ports -j DNAT --to $to"); |
|
429
|
0
|
|
|
|
|
0
|
ipt("-t nat -A PREROUTING -i $bopts->{iface} -p udp --dport $ports -j DNAT --to $to"); |
|
430
|
|
|
|
|
|
|
} |
|
431
|
0
|
|
|
|
|
0
|
else { ipt("-t nat -A PREROUTING -i $bopts->{iface} -p $proto --dport $ports -j DNAT --to $to"); } |
|
432
|
0
|
|
|
|
|
0
|
return 1; |
|
433
|
|
|
|
|
|
|
} |
|
434
|
|
|
|
|
|
|
} |
|
435
|
|
|
|
|
|
|
|
|
436
|
|
|
|
|
|
|
=head2 enable_state_matching |
|
437
|
|
|
|
|
|
|
|
|
438
|
|
|
|
|
|
|
Accept related and established connections so client side |
|
439
|
|
|
|
|
|
|
activities, ie: ftp, work correctly. |
|
440
|
|
|
|
|
|
|
|
|
441
|
|
|
|
|
|
|
=cut |
|
442
|
|
|
|
|
|
|
|
|
443
|
|
|
|
|
|
|
sub enable_state_matching { |
|
444
|
0
|
|
|
0
|
1
|
0
|
ipt("-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT"); |
|
445
|
0
|
|
|
|
|
0
|
return 1; |
|
446
|
|
|
|
|
|
|
} |
|
447
|
|
|
|
|
|
|
|
|
448
|
|
|
|
|
|
|
=head2 enable_ip_forwarding |
|
449
|
|
|
|
|
|
|
|
|
450
|
|
|
|
|
|
|
Simply switches on IP forwarding in /proc/sys/net/ipv4/ip_forward, if |
|
451
|
|
|
|
|
|
|
your system supports it. |
|
452
|
|
|
|
|
|
|
|
|
453
|
|
|
|
|
|
|
=cut |
|
454
|
|
|
|
|
|
|
|
|
455
|
|
|
|
|
|
|
sub enable_ip_forwarding { |
|
456
|
0
|
0
|
|
0
|
1
|
0
|
if ($bopts->{dry}) { say "-> NAT enabled"; } |
|
|
0
|
|
|
|
|
0
|
|
|
457
|
0
|
|
|
|
|
0
|
else { system('echo 1 > /proc/sys/net/ipv4/ip_forward'); } |
|
458
|
|
|
|
|
|
|
} |
|
459
|
|
|
|
|
|
|
|
|
460
|
|
|
|
|
|
|
=head2 accept_local |
|
461
|
|
|
|
|
|
|
|
|
462
|
|
|
|
|
|
|
Accept everything locally |
|
463
|
|
|
|
|
|
|
|
|
464
|
|
|
|
|
|
|
=cut |
|
465
|
|
|
|
|
|
|
|
|
466
|
|
|
|
|
|
|
sub accept_local { |
|
467
|
0
|
|
|
0
|
1
|
0
|
ipt('-A INPUT -i lo -j ACCEPT'); |
|
468
|
0
|
|
|
|
|
0
|
return 1; |
|
469
|
|
|
|
|
|
|
} |
|
470
|
|
|
|
|
|
|
|
|
471
|
|
|
|
|
|
|
=head2 accept_all_from |
|
472
|
|
|
|
|
|
|
|
|
473
|
|
|
|
|
|
|
Accept all incoming connections from a specific IP, or locally. |
|
474
|
|
|
|
|
|
|
You can pass an array to allow multiple sources. |
|
475
|
|
|
|
|
|
|
|
|
476
|
|
|
|
|
|
|
accept_all_from('local'); |
|
477
|
|
|
|
|
|
|
accept_all_from('10.1.1.5'); |
|
478
|
|
|
|
|
|
|
accept_all_from([qw/10.1.1.4 10.1.1.5 10.1.2.7/]); |
|
479
|
|
|
|
|
|
|
|
|
480
|
|
|
|
|
|
|
=cut |
|
481
|
|
|
|
|
|
|
|
|
482
|
|
|
|
|
|
|
sub accept_all_from { |
|
483
|
0
|
|
|
0
|
1
|
0
|
my $args = shift; |
|
484
|
|
|
|
|
|
|
|
|
485
|
0
|
0
|
|
|
|
0
|
if (ref $args eq 'ARRAY') { |
|
|
|
0
|
|
|
|
|
|
|
486
|
0
|
|
|
|
|
0
|
for (@$args) { |
|
487
|
0
|
|
|
|
|
0
|
ipt("-A INPUT -s $_ -d 0/0 -p all -j ACCEPT"); |
|
488
|
|
|
|
|
|
|
} |
|
489
|
|
|
|
|
|
|
} |
|
490
|
0
|
|
|
|
|
0
|
elsif ($args eq 'local') { ipt('-A INPUT -i lo -j ACCEPT'); } |
|
491
|
0
|
|
|
|
|
0
|
else { ipt("-A INPUT -s $args -d 0/0 -p all -j ACCEPT"); } |
|
492
|
|
|
|
|
|
|
|
|
493
|
0
|
|
|
|
|
0
|
return 1; |
|
494
|
|
|
|
|
|
|
} |
|
495
|
|
|
|
|
|
|
|
|
496
|
|
|
|
|
|
|
=head2 flush |
|
497
|
|
|
|
|
|
|
|
|
498
|
|
|
|
|
|
|
Flushes specific chains, including nat and mangle. |
|
499
|
|
|
|
|
|
|
|
|
500
|
|
|
|
|
|
|
flush(); # flush everything |
|
501
|
|
|
|
|
|
|
flush([qw/INPUT FORWARD nat/]) |
|
502
|
|
|
|
|
|
|
|
|
503
|
|
|
|
|
|
|
=cut |
|
504
|
|
|
|
|
|
|
|
|
505
|
|
|
|
|
|
|
sub flush { |
|
506
|
0
|
|
|
0
|
1
|
0
|
my $opts = shift; |
|
507
|
0
|
|
|
|
|
0
|
my $errors = 0; |
|
508
|
0
|
|
|
|
|
0
|
my @flush_items; |
|
509
|
0
|
0
|
|
|
|
0
|
if (ref $opts eq 'ARRAY') { |
|
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
510
|
0
|
|
|
|
|
0
|
for (@{$opts}) { |
|
|
0
|
|
|
|
|
0
|
|
|
511
|
0
|
|
|
|
|
0
|
given (uc $_) { |
|
512
|
0
|
|
|
|
|
0
|
when ('INPUT') { push @flush_items, $_; } |
|
|
0
|
|
|
|
|
0
|
|
|
513
|
0
|
|
|
|
|
0
|
when ('OUTPUT') { push @flush_items, $_; } |
|
|
0
|
|
|
|
|
0
|
|
|
514
|
0
|
|
|
|
|
0
|
when ('FORWARD') { push @flush_items, $_; } |
|
|
0
|
|
|
|
|
0
|
|
|
515
|
0
|
|
|
|
|
0
|
when ('MANGLE') { push @flush_items, $_; } |
|
|
0
|
|
|
|
|
0
|
|
|
516
|
0
|
|
|
|
|
0
|
when ('NAT') { push @flush_items, $_; } |
|
|
0
|
|
|
|
|
0
|
|
|
517
|
0
|
|
|
|
|
0
|
when ('CUSTOM') { push @flush_items, $_; } |
|
|
0
|
|
|
|
|
0
|
|
|
518
|
|
|
|
|
|
|
} |
|
519
|
|
|
|
|
|
|
} |
|
520
|
|
|
|
|
|
|
} |
|
521
|
|
|
|
|
|
|
elsif (ref $opts eq 'SCALAR') { |
|
522
|
0
|
0
|
|
|
|
0
|
if (! grep $_ eq $opts, [qw/INPUT OUTPUT FORWARD mangle nat custom/]) { |
|
523
|
0
|
|
|
|
|
0
|
die "Can't flush chain '$opts'. Not a valid chain"; |
|
524
|
|
|
|
|
|
|
} |
|
525
|
0
|
|
|
|
|
0
|
push @flush_items, $opts; |
|
526
|
|
|
|
|
|
|
} |
|
527
|
0
|
|
|
|
|
0
|
elsif (! defined $opts) { @flush_items = qw/INPUT OUTPUT FORWARD mangle nat custom/; } |
|
528
|
|
|
|
|
|
|
|
|
529
|
0
|
|
|
|
|
0
|
my $item; |
|
530
|
0
|
|
|
|
|
0
|
for (@flush_items) { |
|
531
|
0
|
0
|
0
|
|
|
0
|
next if $_ eq ''||undef; |
|
532
|
0
|
|
|
|
|
0
|
$item = lc $_; |
|
533
|
0
|
0
|
0
|
|
|
0
|
if (($item eq 'nat' || $item eq 'mangle')) { |
|
|
|
0
|
|
|
|
|
|
|
534
|
0
|
0
|
|
|
|
0
|
if (ipt("-F -t $item")) { |
|
535
|
0
|
|
|
|
|
0
|
say "-> Flushing $item"; |
|
536
|
|
|
|
|
|
|
} |
|
537
|
0
|
|
|
|
|
0
|
else { log_error("Could not flush $item"); $errors++; } |
|
|
0
|
|
|
|
|
0
|
|
|
538
|
|
|
|
|
|
|
} |
|
539
|
|
|
|
|
|
|
elsif ($item eq 'custom') { |
|
540
|
0
|
0
|
|
|
|
0
|
if (ipt("-X")) { |
|
541
|
0
|
|
|
|
|
0
|
say "-> Flushing custom chains (-X)"; |
|
542
|
|
|
|
|
|
|
} |
|
543
|
0
|
|
|
|
|
0
|
else { log_error("Could not flush custom chains"); $errors++; } |
|
|
0
|
|
|
|
|
0
|
|
|
544
|
|
|
|
|
|
|
} |
|
545
|
|
|
|
|
|
|
else { |
|
546
|
0
|
|
|
|
|
0
|
$item = uc $item; |
|
547
|
0
|
0
|
|
|
|
0
|
if (ipt("-F $item")) { |
|
548
|
0
|
|
|
|
|
0
|
say "-> Flushing chain $item"; |
|
549
|
|
|
|
|
|
|
} |
|
550
|
0
|
|
|
|
|
0
|
else { log_error("Could not flush chain $item"); $errors++; } |
|
|
0
|
|
|
|
|
0
|
|
|
551
|
|
|
|
|
|
|
} |
|
552
|
|
|
|
|
|
|
} |
|
553
|
0
|
0
|
|
|
|
0
|
return 1 if ! $errors; |
|
554
|
|
|
|
|
|
|
} |
|
555
|
|
|
|
|
|
|
|
|
556
|
|
|
|
|
|
|
sub ipt { |
|
557
|
8
|
|
|
8
|
0
|
12
|
my $cmd = shift; |
|
558
|
8
|
|
|
|
|
13
|
my $ipt = $bopts->{ipt}; |
|
559
|
|
|
|
|
|
|
|
|
560
|
8
|
50
|
|
|
|
19
|
if ($bopts->{debug}) { |
|
561
|
0
|
|
|
|
|
0
|
say "[debug] $bopts->{ipt} $cmd"; |
|
562
|
|
|
|
|
|
|
} |
|
563
|
|
|
|
|
|
|
|
|
564
|
|
|
|
|
|
|
#my $out = `$ipt $cmd 2>&1`; |
|
565
|
|
|
|
|
|
|
#if ($out ne '') { |
|
566
|
|
|
|
|
|
|
# return 0; |
|
567
|
|
|
|
|
|
|
#} |
|
568
|
|
|
|
|
|
|
#else { return 1; } |
|
569
|
8
|
|
|
|
|
9
|
push @{$bopts->{buffer}}, $cmd; |
|
|
8
|
|
|
|
|
15
|
|
|
570
|
8
|
|
|
|
|
18
|
return 1; |
|
571
|
|
|
|
|
|
|
} |
|
572
|
|
|
|
|
|
|
|
|
573
|
|
|
|
|
|
|
sub log_error { |
|
574
|
0
|
|
|
0
|
0
|
|
my $err = shift; |
|
575
|
|
|
|
|
|
|
|
|
576
|
0
|
|
|
|
|
|
push (@{$bopts->{errors}}, $err); |
|
|
0
|
|
|
|
|
|
|
|
577
|
|
|
|
|
|
|
} |
|
578
|
|
|
|
|
|
|
|
|
579
|
|
|
|
|
|
|
=head2 default_policy |
|
580
|
|
|
|
|
|
|
|
|
581
|
|
|
|
|
|
|
Sets the default policy for the specified chain. |
|
582
|
|
|
|
|
|
|
|
|
583
|
|
|
|
|
|
|
default_policy({ |
|
584
|
|
|
|
|
|
|
INPUT => 'DROP', |
|
585
|
|
|
|
|
|
|
FORWARD => 'DROP', |
|
586
|
|
|
|
|
|
|
}); |
|
587
|
|
|
|
|
|
|
|
|
588
|
|
|
|
|
|
|
=cut |
|
589
|
|
|
|
|
|
|
|
|
590
|
|
|
|
|
|
|
sub default_policy { |
|
591
|
0
|
|
|
0
|
1
|
|
my $opt = shift; |
|
592
|
|
|
|
|
|
|
|
|
593
|
0
|
|
|
|
|
|
my $policy; |
|
594
|
0
|
|
|
|
|
|
my @chains = qw/INPUT OUTPUT FORWARD/; |
|
595
|
0
|
|
|
|
|
|
for (keys %$opt) { |
|
596
|
0
|
|
|
|
|
|
$policy = uc $opt->{$_}; |
|
597
|
0
|
0
|
|
|
|
|
if (! grep $_ eq $_, @chains) { |
|
598
|
0
|
|
|
|
|
|
log_error("No such chain: $_"); |
|
599
|
|
|
|
|
|
|
} |
|
600
|
|
|
|
|
|
|
else { |
|
601
|
0
|
0
|
|
|
|
|
if (ipt("-P $_ $policy")) { |
|
602
|
0
|
|
|
|
|
|
say "-> Setting default policy for $_ to $policy"; |
|
603
|
0
|
|
|
|
|
|
return 1; |
|
604
|
|
|
|
|
|
|
} |
|
605
|
|
|
|
|
|
|
else { |
|
606
|
0
|
|
|
|
|
|
log_error("Could not set default policy for $_ to $policy"); |
|
607
|
|
|
|
|
|
|
} |
|
608
|
|
|
|
|
|
|
} |
|
609
|
|
|
|
|
|
|
} |
|
610
|
|
|
|
|
|
|
} |
|
611
|
|
|
|
|
|
|
|
|
612
|
|
|
|
|
|
|
=head2 bison_finish |
|
613
|
|
|
|
|
|
|
|
|
614
|
|
|
|
|
|
|
Call this method last, and don't forget. It cleans everything up |
|
615
|
|
|
|
|
|
|
and checks for errors. Also, it can print out a list of the IPTables |
|
616
|
|
|
|
|
|
|
commands you need to generate your firewall script |
|
617
|
|
|
|
|
|
|
|
|
618
|
|
|
|
|
|
|
=cut |
|
619
|
|
|
|
|
|
|
|
|
620
|
|
|
|
|
|
|
sub bison_finish { |
|
621
|
0
|
|
|
0
|
1
|
|
my $file = shift; |
|
622
|
|
|
|
|
|
|
|
|
623
|
0
|
|
|
|
|
|
my $errors = 0; |
|
624
|
0
|
0
|
|
|
|
|
if (@{$bopts->{errors}} > 0) { $errors = @{$bopts->{errors}} } |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
625
|
|
|
|
|
|
|
|
|
626
|
0
|
0
|
|
|
|
|
if ($errors > 0) { |
|
627
|
0
|
|
|
|
|
|
say "Errors"; |
|
628
|
0
|
|
|
|
|
|
my $i; |
|
629
|
0
|
|
|
|
|
|
say "---"; |
|
630
|
0
|
|
|
|
|
|
for (@{$bopts->{errors}}) { |
|
|
0
|
|
|
|
|
|
|
|
631
|
0
|
|
|
|
|
|
$i++; |
|
632
|
0
|
|
|
|
|
|
say "$i: $_"; |
|
633
|
|
|
|
|
|
|
} |
|
634
|
|
|
|
|
|
|
} |
|
635
|
0
|
|
|
|
|
|
else { say "No problems occurred"; } |
|
636
|
|
|
|
|
|
|
|
|
637
|
|
|
|
|
|
|
# read buffer |
|
638
|
0
|
0
|
|
|
|
|
unless (! $bopts->{verbose}) { |
|
639
|
0
|
|
|
|
|
|
my $i = 0; |
|
640
|
0
|
|
|
|
|
|
for (@{$bopts->{buffer}}) { |
|
|
0
|
|
|
|
|
|
|
|
641
|
0
|
|
|
|
|
|
$i++; |
|
642
|
0
|
|
|
|
|
|
say "$i: $_"; |
|
643
|
|
|
|
|
|
|
} |
|
644
|
|
|
|
|
|
|
} |
|
645
|
|
|
|
|
|
|
|
|
646
|
|
|
|
|
|
|
# do we have a file to write to? |
|
647
|
0
|
0
|
|
|
|
|
if ($file) { |
|
648
|
0
|
0
|
|
|
|
|
open(my $fh, ">$file") or die "Could not write to $file\n"; |
|
649
|
0
|
|
|
|
|
|
print $fh "#########################\n"; |
|
650
|
0
|
|
|
|
|
|
print $fh "# Generated by Bison $Bison::VERSION\n"; |
|
651
|
0
|
|
|
|
|
|
print $fh "#########################\n"; |
|
652
|
0
|
|
|
|
|
|
for (@{$bopts->{buffer}}) { |
|
|
0
|
|
|
|
|
|
|
|
653
|
0
|
|
|
|
|
|
print $fh $_ . "\n"; |
|
654
|
|
|
|
|
|
|
} |
|
655
|
0
|
|
|
|
|
|
close $fh; |
|
656
|
|
|
|
|
|
|
} |
|
657
|
|
|
|
|
|
|
} |
|
658
|
|
|
|
|
|
|
|
|
659
|
|
|
|
|
|
|
=head1 BUGS |
|
660
|
|
|
|
|
|
|
|
|
661
|
|
|
|
|
|
|
Please e-mail brad@geeksware.net |
|
662
|
|
|
|
|
|
|
|
|
663
|
|
|
|
|
|
|
=head1 AUTHOR |
|
664
|
|
|
|
|
|
|
|
|
665
|
|
|
|
|
|
|
Brad Haywood |
|
666
|
|
|
|
|
|
|
|
|
667
|
|
|
|
|
|
|
=head1 COPYRIGHT & LICENSE |
|
668
|
|
|
|
|
|
|
|
|
669
|
|
|
|
|
|
|
Copyright 2011 the above author(s). |
|
670
|
|
|
|
|
|
|
|
|
671
|
|
|
|
|
|
|
This sofware is free software, and is licensed under the same terms as perl itself. |
|
672
|
|
|
|
|
|
|
|
|
673
|
|
|
|
|
|
|
=cut |
|
674
|
|
|
|
|
|
|
|
|
675
|
|
|
|
|
|
|
1; # End of Bison |