2022-02-24 00:39:49 +05:00
|
|
|
# this custom script demonstrates how to reuse built-in modes and add something from yourself
|
|
|
|
|
|
|
|
MY_TPPORT=$(($TPPORT + 1))
|
|
|
|
MY_TPWS_OPT="--methodeol --hostcase"
|
|
|
|
MY_DPORT=81
|
|
|
|
|
|
|
|
zapret_custom_daemons()
|
|
|
|
{
|
|
|
|
# stop logic is managed by procd
|
2022-02-24 00:46:04 +05:00
|
|
|
|
2022-02-24 00:39:49 +05:00
|
|
|
local MODE_OVERRIDE=tpws
|
|
|
|
local opt
|
|
|
|
|
|
|
|
start_daemons_procd
|
|
|
|
|
|
|
|
opt="--port=$MY_TPPORT $MY_TPWS_OPT"
|
|
|
|
filter_apply_hostlist_target opt
|
|
|
|
run_tpws 100 "$opt"
|
|
|
|
}
|
|
|
|
zapret_custom_firewall()
|
|
|
|
{
|
|
|
|
# $1 - 1 - run, 0 - stop
|
|
|
|
|
|
|
|
local MODE_OVERRIDE=tpws
|
|
|
|
local f4 f6
|
|
|
|
|
|
|
|
zapret_do_firewall_rules_ipt $1
|
|
|
|
|
2022-03-04 19:30:02 +05:00
|
|
|
f4="-p tcp --dport $MY_DPORT"
|
2022-02-24 00:39:49 +05:00
|
|
|
f6=$f4
|
|
|
|
filter_apply_ipset_target f4 f6
|
|
|
|
fw_tpws $1 "$f4" "$f6" $MY_TPPORT
|
|
|
|
}
|
|
|
|
zapret_custom_firewall_nft()
|
|
|
|
{
|
|
|
|
# stop logic is not required
|
|
|
|
|
|
|
|
local MODE_OVERRIDE=tpws
|
|
|
|
local f4 f6
|
|
|
|
|
|
|
|
zapret_apply_firewall_rules_nft
|
|
|
|
|
|
|
|
f4="tcp dport $MY_DPORT"
|
|
|
|
f6=$f4
|
|
|
|
nft_filter_apply_ipset_target f4 f6
|
|
|
|
nft_fw_tpws "$f4" "$f6" $MY_TPPORT
|
|
|
|
}
|