From 17daf0ec7887a3c436093b56c8720645ef4ccf62 Mon Sep 17 00:00:00 2001 From: sebres <info@sebres.de> Date: Sun, 9 Jun 2024 23:32:03 +0200 Subject: [PATCH] `action.d/firewallcmd-ipset.conf`: rename `ipsettype` to `ipsetbackend` (`ipsettype` will be used now to the real set type); amend to #2620 --- ChangeLog | 2 ++ config/action.d/firewallcmd-ipset.conf | 20 ++++++++++---------- 2 files changed, 12 insertions(+), 10 deletions(-) diff --git a/ChangeLog b/ChangeLog index 66539a37..40d35c42 100644 --- a/ChangeLog +++ b/ChangeLog @@ -18,6 +18,8 @@ ver. 1.1.1-dev-1 (20??/??/??) - development nightly edition * `paths-debian.conf`: - default banactions are `nftables` - sshd backend switched to `systemd` (gh-3292) +* `action.d/firewallcmd-ipset.conf`: + - rename `ipsettype` to `ipsetbackend` (gh-2620), parameter `ipsettype` will be used now to the real set type (gh-3760) ### New Features and Enhancements diff --git a/config/action.d/firewallcmd-ipset.conf b/config/action.d/firewallcmd-ipset.conf index c5282c62..7edfa896 100644 --- a/config/action.d/firewallcmd-ipset.conf +++ b/config/action.d/firewallcmd-ipset.conf @@ -18,22 +18,22 @@ before = firewallcmd-common.conf [Definition] -actionstart = <ipstype_<ipsettype>/actionstart> +actionstart = <ipsbackend_<ipsetbackend>/actionstart> firewall-cmd --direct --add-rule <family> filter <chain> 0 <actiontype> -m set --match-set <ipmset> src -j <blocktype> -actionflush = <ipstype_<ipsettype>/actionflush> +actionflush = <ipsbackend_<ipsetbackend>/actionflush> actionstop = firewall-cmd --direct --remove-rule <family> filter <chain> 0 <actiontype> -m set --match-set <ipmset> src -j <blocktype> <actionflush> - <ipstype_<ipsettype>/actionstop> + <ipsbackend_<ipsetbackend>/actionstop> -actionban = <ipstype_<ipsettype>/actionban> +actionban = <ipsbackend_<ipsetbackend>/actionban> # actionprolong = %(actionban)s -actionunban = <ipstype_<ipsettype>/actionunban> +actionunban = <ipsbackend_<ipsetbackend>/actionunban> -[ipstype_ipset] +[ipsbackend_ipset] actionstart = ipset -exist create <ipmset> hash:ip timeout <default-ipsettime> maxelem <maxelem> <familyopt> @@ -45,7 +45,7 @@ actionban = ipset -exist add <ipmset> <ip> timeout <ipsettime> actionunban = ipset -exist del <ipmset> <ip> -[ipstype_firewalld] +[ipsbackend_firewalld] actionstart = firewall-cmd --direct --new-ipset=<ipmset> --type=hash:ip --option=timeout=<default-ipsettime> --option=maxelem=<maxelem> <firewalld_familyopt> @@ -87,11 +87,11 @@ maxelem = 65536 # banaction = %(known/banaction)s[ipsettime='<timeout-bantime>'] timeout-bantime = $([ "<bantime>" -le 2147483 ] && echo "<bantime>" || echo 0) -# Option: ipsettype -# Notes.: defines type of ipset used for match-set (firewalld or ipset) +# Option: ipsetbackend +# Notes.: defines the backend of ipset used for match-set (firewalld or ipset) # Values: firewalld or ipset # Default: ipset -ipsettype = ipset +ipsetbackend = ipset # Option: actiontype # Notes.: defines additions to the blocking rule