lib/shutter/content.rb in shutter-0.0.7 vs lib/shutter/content.rb in shutter-0.1.0

- old
+ new

@@ -1,6 +1,16 @@ module Shutter + module Content +CONFIG_FILES = %w[ + base.ipt + iface.dmz + iface.forward + ip.allow + ip.deny + ports.private + ports.public +] BASE_IPT = %q{# Generated by Shutter *filter :INPUT DROP [0:0] :FORWARD DROP [0:0] @@ -141,11 +151,11 @@ ################################################################## # NATing ################################################################## # [RULES:FORWARD] --A FORWARD ! -d 0.0.0.255/0.0.0.255 -m limit --limit 3/min -j LOG --log-prefix "iptables: Unauthorized Forward:" +-A FORWARD ! -d 0.0.0.255/0.0.0.255 -m limit --limit 3/min -j LOG --log-prefix "iptables: Bad NAT:" -A FORWARD -j DROP ################################################################## # Add any additional rules that fail2ban has added ################################################################## @@ -161,11 +171,11 @@ COMMIT } IFACE_DMZ = %q{# Generated by Shutter -# iface +# device # eth0 # eth1 } IP_ALLOW = %q{# Generated by Shutter @@ -193,6 +203,43 @@ IFACE_FORWARD = %q{ # src iface | dst iface # eth0 eth1 } + +IFACE_DMZ_MOCK = %q{# Generated by Shutter +# device +eth0 +eth1 +} + +IP_ALLOW_MOCK = %q{# Generated by Shutter +# ipaddr +# ipaddr/subnet +192.168.0.0/16 +10.0.0.1 +} + +IP_DENY_MOCK = %q{# Generated by Shutter +# ipaddr +# ipaddr/subnet +172.31.0.0/24 +8.9.9.9 +} + +PORTS_PUBLIC_MOCK = %q{ +# proto port +80 tcp +443 tcp +} + +PORTS_PRIVATE_MOCK = %q{ +# proto port +22 tcp +} + +IFACE_FORWARD_MOCK = %q{ +# src iface | dst iface +eth0 eth1 +} + end end \ No newline at end of file