mirror of
https://github.com/bol-van/zapret.git
synced 2024-11-26 20:20:53 +03:00
48 lines
865 B
Plaintext
48 lines
865 B
Plaintext
# this custom script demonstrates how to reuse built-in modes and add something from yourself
|
|
|
|
MY_TPPORT=$(($TPPORT + 1))
|
|
MY_TPWS_OPT="--methodeol --hostcase"
|
|
MY_DPORT=81
|
|
|
|
zapret_custom_daemons()
|
|
{
|
|
# $1 - 1 - run, 0 - stop
|
|
|
|
local MODE_OVERRIDE=tpws
|
|
local opt
|
|
|
|
zapret_do_daemons $1
|
|
|
|
opt="--port=$MY_TPPORT $MY_TPWS_OPT"
|
|
filter_apply_hostlist_target opt
|
|
do_tpws $1 100 "$opt"
|
|
}
|
|
zapret_custom_firewall()
|
|
{
|
|
# $1 - 1 - run, 0 - stop
|
|
|
|
local MODE_OVERRIDE=tpws
|
|
local f4 f6
|
|
|
|
zapret_do_firewall_rules_ipt $1
|
|
|
|
f4="-p tcp --dport $MY_DPORT"
|
|
f6=$f4
|
|
filter_apply_ipset_target f4 f6
|
|
fw_tpws $1 "$f4" "$f6" $MY_TPPORT
|
|
}
|
|
zapret_custom_firewall_nft()
|
|
{
|
|
# stop logic is not required
|
|
|
|
local MODE_OVERRIDE=tpws
|
|
local f4 f6
|
|
|
|
zapret_apply_firewall_rules_nft
|
|
|
|
f4="tcp dport $MY_DPORT"
|
|
f6=$f4
|
|
nft_filter_apply_ipset_target f4 f6
|
|
nft_fw_tpws "$f4" "$f6" $MY_TPPORT
|
|
}
|