lib/shutter/content.rb in shutter-0.0.7 vs lib/shutter/content.rb in shutter-0.1.0
- old
+ new
@@ -1,6 +1,16 @@
module Shutter
+ module Content
+CONFIG_FILES = %w[
+ base.ipt
+ iface.dmz
+ iface.forward
+ ip.allow
+ ip.deny
+ ports.private
+ ports.public
+]
BASE_IPT = %q{# Generated by Shutter
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
@@ -141,11 +151,11 @@
##################################################################
# NATing
##################################################################
# [RULES:FORWARD]
--A FORWARD ! -d 0.0.0.255/0.0.0.255 -m limit --limit 3/min -j LOG --log-prefix "iptables: Unauthorized Forward:"
+-A FORWARD ! -d 0.0.0.255/0.0.0.255 -m limit --limit 3/min -j LOG --log-prefix "iptables: Bad NAT:"
-A FORWARD -j DROP
##################################################################
# Add any additional rules that fail2ban has added
##################################################################
@@ -161,11 +171,11 @@
COMMIT
}
IFACE_DMZ = %q{# Generated by Shutter
-# iface
+# device
# eth0
# eth1
}
IP_ALLOW = %q{# Generated by Shutter
@@ -193,6 +203,43 @@
IFACE_FORWARD = %q{
# src iface | dst iface
# eth0 eth1
}
+
+IFACE_DMZ_MOCK = %q{# Generated by Shutter
+# device
+eth0
+eth1
+}
+
+IP_ALLOW_MOCK = %q{# Generated by Shutter
+# ipaddr
+# ipaddr/subnet
+192.168.0.0/16
+10.0.0.1
+}
+
+IP_DENY_MOCK = %q{# Generated by Shutter
+# ipaddr
+# ipaddr/subnet
+172.31.0.0/24
+8.9.9.9
+}
+
+PORTS_PUBLIC_MOCK = %q{
+# proto port
+80 tcp
+443 tcp
+}
+
+PORTS_PRIVATE_MOCK = %q{
+# proto port
+22 tcp
+}
+
+IFACE_FORWARD_MOCK = %q{
+# src iface | dst iface
+eth0 eth1
+}
+ end
end
\ No newline at end of file