summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorChris Lumens <clumens@redhat.com>2005-07-21 19:09:36 +0000
committerChris Lumens <clumens@redhat.com>2005-07-21 19:09:36 +0000
commite3c4006bfc19c00ebfae51bf26068c7a365ec9ae (patch)
treea7192fd40c20ab8f7269912dbdde7ec739c6a4bb
parent8688fe266e68ceb3f2e76aed2d957fd642b890ed (diff)
downloadanaconda-e3c4006bfc19c00ebfae51bf26068c7a365ec9ae.tar.gz
anaconda-e3c4006bfc19c00ebfae51bf26068c7a365ec9ae.tar.xz
anaconda-e3c4006bfc19c00ebfae51bf26068c7a365ec9ae.zip
Remove firewall configuration screen. This will be coming back in
firstboot using system-config-securitylevel.
-rw-r--r--ChangeLog16
-rw-r--r--dispatch.py1
-rw-r--r--firewall.py37
-rwxr-xr-xgui.py1
-rw-r--r--installclass.py22
-rw-r--r--iw/firewall_gui.py183
-rw-r--r--iw/network_gui.py7
-rw-r--r--kickstart.py3
-rw-r--r--text.py2
-rw-r--r--textw/firewall_text.py203
-rw-r--r--textw/network_text.py8
11 files changed, 35 insertions, 448 deletions
diff --git a/ChangeLog b/ChangeLog
index cb7abb943..cc452b069 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,19 @@
+2005-07-21 Chris Lumens <clumens@redhat.com>
+
+ * dispatch.py (installSteps): Remove firewall step.
+ * gui.py (stepToClass): Likewise.
+ * kickstart.py (Kickstart.setSteps): Likewise.
+ * text.py (stepToClasses): Likewise.
+ * firewall.py: Remove Service class.
+ * installclass.py (BaseInstallClass.setFirewall): Interactive
+ kickstart installs can no longer see a firewall config screen, so
+ simplify this method.
+ * iw/network_gui.py (NetworkWindow.getNext): Initialize firewall and
+ SELinux.
+ * textw/network_text.py (NetworkGlobalWindow.__call__): Likewise.
+ * iw/firewall_gui.py: Removed.
+ * textw/firewall_text.py: Likewise.
+
2005-07-21 Bill Nottingham <notting@redhat.com>
* network.py: Use the right enum. Not that it makes
diff --git a/dispatch.py b/dispatch.py
index e20c46a61..c1154db6f 100644
--- a/dispatch.py
+++ b/dispatch.py
@@ -103,7 +103,6 @@ installSteps = [
"id.diskset")),
("networkdevicecheck", networkDeviceCheck, ("id.network", "dispatch")),
("network", ("id.network", "dir", "intf", "id")),
- ("firewall", ("intf", "id.network", "id.firewall", "id.security")),
("timezone", ("id.instLanguage", "id.timezone")),
("accounts", ("intf", "id.rootPassword")),
("authentication", ("id.auth",)),
diff --git a/firewall.py b/firewall.py
index 10ddf7e77..08f990248 100644
--- a/firewall.py
+++ b/firewall.py
@@ -22,40 +22,11 @@ from flags import flags
from rhpl.log import log
from rhpl.translate import _, N_
-class Service:
- def __init__ (self, key, name, ports):
- self.key = key
- self.name = name
- self.allowed = 0
-
- if type(ports) == type(""):
- self.ports = [ ports ]
- else:
- self.ports = ports
-
-
- def set_enabled(self, val):
- self.allowed = val
-
- def get_enabled(self):
- return self.allowed
-
- def get_name(self):
- return self.name
-
- def get_ports(self):
- return self.ports
-
class Firewall:
def __init__ (self):
self.enabled = 1
self.trustdevs = []
self.portlist = []
- self.services = [ Service("ssh", N_("Remote Login (SSH)"), "22:tcp"),
- Service("http", N_("Web Server (HTTP, HTTPS)"), "80:tcp"),
- Service("ftp", N_("File Transfer (FTP)"), "21:tcp"),
-
- Service("smtp", N_("Mail Server (SMTP)"), "25:tcp") ]
def writeKS(self, f):
f.write("firewall")
@@ -72,16 +43,11 @@ class Firewall:
args = []
if self.enabled:
- args.append ("--enabled")
+ args.append("--enabled")
else:
args.append("--disabled")
return args
- for service in self.services:
- if service.get_enabled():
- for p in service.get_ports():
- args = args + [ "--port=%s" %(p,) ]
-
for dev in self.trustdevs:
args = args + [ "--trust=%s" %(dev,) ]
@@ -93,7 +59,6 @@ class Firewall:
def write (self, instPath):
args = [ "/usr/sbin/lokkit", "--quiet", "--nostart", "-f" ]
-
args = args + self.getArgList()
try:
diff --git a/gui.py b/gui.py
index 562e75a7e..4d02ff475 100755
--- a/gui.py
+++ b/gui.py
@@ -62,7 +62,6 @@ stepToClass = {
"bootloaderadvanced": ("bootloader_advanced_gui", "AdvancedBootloaderWindow"),
"upgbootloader": ("upgrade_bootloader_gui", "UpgradeBootloaderWindow"),
"network" : ("network_gui", "NetworkWindow"),
- "firewall" : ("firewall_gui", "FirewallWindow"),
"timezone" : ("timezone_gui", "TimezoneWindow"),
"accounts" : ("account_gui", "AccountWindow"),
"authentication" : ("auth_gui", "AuthWindow"),
diff --git a/installclass.py b/installclass.py
index ca90e279d..5d56a645b 100644
--- a/installclass.py
+++ b/installclass.py
@@ -135,7 +135,6 @@ class BaseInstallClass:
"bootloader",
"networkdevicecheck",
"network",
- "firewall",
"timezone",
"accounts",
"readcomps",
@@ -365,24 +364,9 @@ class BaseInstallClass:
def setFirewall(self, id, enable = 1, trusts = [], ports = []):
id.firewall.enabled = enable
id.firewall.trustdevs = trusts
- # this is a little ugly, but we want to let setting a service
- # like --ssh enable the service in case they're doing an interactive
- # kickstart install
- for port in ports:
- found = 0
- for s in id.firewall.services:
- p = s.get_ports()
- # don't worry about the ones that are more than one,
- # this is really for legacy use only
- if len(p) > 1:
- continue
- if p[0] == port:
- s.set_enabled(1)
- found = 1
- break
-
- if not found:
- id.firewall.portlist.append(port)
+
+ for port in ports:
+ id.firewall.portlist.append (port)
def setMiscXSettings(self, id, depth = None, resolution = None,
desktop = None, runlevel = None):
diff --git a/iw/firewall_gui.py b/iw/firewall_gui.py
deleted file mode 100644
index 3c64f0fb2..000000000
--- a/iw/firewall_gui.py
+++ /dev/null
@@ -1,183 +0,0 @@
-#
-# firewall_gui.py: firewall setup screen
-#
-# Copyright 2001-2004 Red Hat, Inc.
-#
-# This software may be freely redistributed under the terms of the GNU
-# library public license.
-#
-# You should have received a copy of the GNU Library Public License
-# along with this program; if not, write to the Free Software
-# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-#
-
-import checklist
-import gtk
-import gui
-from iw_gui import *
-from isys import *
-from rhpl.translate import _, N_
-from flags import flags
-from constants import *
-
-selopts = [ N_("Disabled"), N_("Warn"), N_("Active") ]
-
-class FirewallWindow (InstallWindow):
-
- windowTitle = N_("Firewall")
- htmlTag = "securitylevel"
-
- def __init__ (self, ics):
- InstallWindow.__init__ (self, ics)
-
- def getNext (self):
- self.security.setSELinux(self.selinux_combo.get_active())
-
- if self.disabled_radio.get_active ():
- rc2 = self.intf.messageWindow(_("Warning - No Firewall"),
- _("If this system is attached directly to the Internet or "
- "is on a large public network, it is recommended that a "
- "firewall be configured to help prevent unauthorized "
- "access. However, you have selected not to "
- "configure a firewall. Choose \"Proceed\" to continue "
- "without a firewall."),
- type="custom", custom_icon="warning",
- custom_buttons=[_("_Configure Firewall"), _("_Proceed")])
-
- if rc2 == 0:
- raise gui.StayOnScreen
- self.firewall.enabled = 0
- else:
- self.firewall.enabled = 1
-
- count = 0
- for service in self.firewall.services:
- val = self.incoming.get_active(count)
- service.set_enabled(val)
- count = count + 1
-
- def activate_firewall (self, widget):
- if self.disabled_radio.get_active ():
- self.table.set_sensitive(False)
- else:
- self.table.set_sensitive(True)
-
- def getScreen (self, intf, network, firewall, security):
- self.firewall = firewall
- self.security = security
- self.network = network
- self.intf = intf
-
- self.devices = self.network.available().keys()
- self.devices.sort()
-
- self.netCBs = {}
-
- box = gtk.VBox (False, 5)
- box.set_border_width (5)
-
- label = gui.WrappingLabel (_("A firewall can help prevent "
- "unauthorized access to your computer "
- "from the outside world. Would you like "
- "to enable a firewall?"))
- label.set_alignment (0.0, 0)
- label.set_size_request(450, -1)
-
- box.pack_start(label, False)
-
- vbox = gtk.VBox (False)
-
- self.disabled_radio = gtk.RadioButton (None, (_("N_o firewall")))
- self.enabled_radio = gtk.RadioButton (self.disabled_radio,
- (_("_Enable firewall")))
- self.disabled_radio.connect("clicked", self.activate_firewall)
- self.enabled_radio.connect("clicked", self.activate_firewall)
-
- vbox.pack_start (self.disabled_radio)
- vbox.pack_start (self.enabled_radio)
-
- a = gtk.Alignment ()
- a.add (vbox)
- a.set (0.3, 0, 0.7, 1.0)
-
- box.pack_start (a, False, 5)
-
- self.table = gtk.Table (2, 8)
- box.pack_start (self.table, False, 5)
-
- y = 0
- label = gui.WrappingLabel (_("You can use a firewall to allow "
- "access to specific services on your "
- "computer from other computers. Which "
- "services, if any, do you wish to "
- "allow access to ?"))
- label.set_size_request(400, -1)
- label.set_alignment(0.0, 0.0)
- self.table.attach(label, 0, 2, y, y + 1, gtk.EXPAND | gtk.FILL, gtk.FILL, 5, 5)
-
- y = y + 1
- hbox = gtk.HBox(False, 10)
- self.incoming = checklist.CheckList(1)
- self.incoming.set_size_request(-1, 125)
-
- incomingSW = gtk.ScrolledWindow()
- incomingSW.set_border_width(5)
- incomingSW.set_policy(gtk.POLICY_NEVER, gtk.POLICY_AUTOMATIC)
- incomingSW.set_shadow_type(gtk.SHADOW_IN)
- incomingSW.add(self.incoming)
-
- for serv in self.firewall.services:
- self.incoming.append_row ( (_(serv.get_name()), serv),
- serv.get_enabled() )
-
- self.table.attach (incomingSW, 0, 2, y, y + 1, gtk.EXPAND|gtk.FILL, gtk.FILL, 5, 5)
-
- if self.firewall.enabled == 0:
- self.disabled_radio.set_active (True)
- else:
- self.enabled_radio.set_active(True)
-
- self.activate_firewall(None)
-
- # SELinux widgets
- selbox = gtk.VBox()
- selbox.set_spacing(8)
-
- l = gui.WrappingLabel(_("Security Enhanced Linux (SELinux) "
- "provides finer-grained "
- "security controls than those available "
- "in a traditional Linux system. It can "
- "be set up in a disabled state, a state "
- "which only warns about things which would "
- "be denied, or a fully active state."))
- l.set_size_request(400, -1)
- l.set_alignment(0.0, 0.0)
-
- selbox.pack_start(l, False)
-
- label = gtk.Label(_("Enable _SELinux?:"))
- label.set_use_underline(True)
- self.selinux_combo = gtk.combo_box_new_text()
- label.set_mnemonic_widget(self.selinux_combo)
-
- for i in selopts:
- self.selinux_combo.append_text(_(i))
-
- self.selinux_combo.set_active(self.security.getSELinux())
-
- hbox = gtk.HBox()
- hbox.set_spacing(8)
- hbox.pack_start(label, False)
- hbox.pack_start(self.selinux_combo, False)
- selbox.pack_start(hbox)
-
- if flags.selinux == 0:
- selbox.set_sensitive(False)
-
- if (SELINUX_DEFAULT == 1) or flags.selinux:
- box.pack_start (gtk.HSeparator(), False)
- box.pack_start(selbox, False)
-
- return box
-
-
diff --git a/iw/network_gui.py b/iw/network_gui.py
index c5b4da9f9..236ebe529 100644
--- a/iw/network_gui.py
+++ b/iw/network_gui.py
@@ -122,6 +122,13 @@ class NetworkWindow(InstallWindow):
self.network.hostname = newHostname
self.network.overrideDHCPhostname = override
+ # Initialize firewall and SELinux settings to our strict defaults
+ # but only if we're not doing a kickstart install.
+ if self.id.instClass.name != "kickstart":
+ import security
+ self.id.instClass.setFirewall (self.id, ports = ["22:tcp"])
+ self.id.instClass.setSELinux (self.id, security.SEL_ENFORCING)
+
return None
def DHCPtoggled(self, widget, (dev, table)):
diff --git a/kickstart.py b/kickstart.py
index 1fe004940..774bbd4f4 100644
--- a/kickstart.py
+++ b/kickstart.py
@@ -1404,9 +1404,6 @@ class Kickstart(BaseInstallClass):
dispatch.skipStep("network")
dispatch.skipStep("installtype")
- # skipping firewall by default, disabled by default
- dispatch.skipStep("firewall")
-
for n in self.skipSteps:
dispatch.skipStep(n)
for n in self.showSteps:
diff --git a/text.py b/text.py
index a452156cb..fa512b76b 100644
--- a/text.py
+++ b/text.py
@@ -59,8 +59,6 @@ stepToClasses = {
"BootloaderLocationWindow")),
"network" : ("network_text", ("NetworkDeviceWindow", "NetworkGlobalWindow",
"HostnameWindow")),
- "firewall" : ("firewall_text", ("FirewallWindow",
- "SELinuxWindow")),
"timezone" : ("timezone_text", "TimezoneWindow"),
"accounts" : ("userauth_text", "RootPasswordWindow"),
"authentication" : ("userauth_text", ("AuthConfigWindow")),
diff --git a/textw/firewall_text.py b/textw/firewall_text.py
deleted file mode 100644
index 7ae0acb67..000000000
--- a/textw/firewall_text.py
+++ /dev/null
@@ -1,203 +0,0 @@
-#
-# firewall_text.py: text mode firewall setup
-#
-# Bill Nottingham <notting@redhat.com>
-# Jeremy Katz <katzj@redhat.com>
-#
-# Copyright 2001-2004 Red Hat, Inc.
-#
-# This software may be freely redistributed under the terms of the GNU
-# library public license.
-#
-# You should have received a copy of the GNU Library Public License
-# along with this program; if not, write to the Free Software
-# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-#
-
-from snack import *
-from constants_text import *
-from rhpl.translate import _
-from rhpl.log import log
-from flags import flags
-
-class FirewallWindow:
- def __call__(self, screen, intf, network, firewall, security):
- self.intf = intf
-
- bb = ButtonBar (screen, (TEXT_OK_BUTTON, (_("Customize"), "customize"), TEXT_BACK_BUTTON))
-
- toplevel = GridFormHelp (screen, _("Firewall"),
- "securitylevel", 1, 5)
- text = _("A firewall can help prevent unauthorized access to your "
- "computer from the outside world. Would you like to enable "
- "a firewall?")
- toplevel.add (TextboxReflowed(50, text), 0, 0, (0, 0, 0, 1))
-
- toplevel.add (bb, 0, 4, (0, 0, 0, 0), growx = 1)
-
- smallGrid = Grid(2,1)
-
- bigGrid = Grid(2,15)
-
- typeGrid = Grid(2,1)
-
- self.enabled = SingleRadioButton(_("Enable firewall"), None, firewall.enabled)
- self.enabled.setCallback(self.radiocb, (firewall, self.enabled))
- typeGrid.setField (self.enabled, 0, 0, (0, 0, 1, 0), anchorLeft = 1)
- self.disabled = SingleRadioButton(_("No firewall"), self.enabled, not firewall.enabled)
- self.disabled.setCallback(self.radiocb, (firewall, self.disabled))
- typeGrid.setField (self.disabled, 1, 0 , (0, 0, 1, 0), anchorRight = 1)
-
- smallGrid.setField (typeGrid, 0, 0, (1, 0, 0, 1), anchorLeft = 1, growx = 1)
-
- currentRow = 1
- bigGrid.setField (Label(_("Allow incoming:")), 0, currentRow, (0, 0, 0, 0),
- anchorTop = 1)
-
- self.portGrid = Grid(1, len(firewall.services))
- # list of Service, Checkbox tuples
- self.portboxes = []
- count = 0
- for serv in firewall.services:
- s = Checkbox(_(serv.get_name()), serv.get_enabled())
- self.portboxes.append((serv, s))
- self.portGrid.setField (s, 0, count, (0, 0, 1, 0), anchorLeft = 1)
- count += 1
-
- bigGrid.setField (self.portGrid, 1, currentRow, (1, 0, 0, 0), anchorLeft = 1)
- bigGrid.setField (Label(""), 0, currentRow + 1, (0, 0, 0, 1), anchorLeft = 1)
-
- toplevel.add(smallGrid, 0, 1, (0, 0, 0, 0), anchorLeft = 1)
- if self.disabled.selected():
- self.radiocb((firewall, self.disabled))
-
- while 1:
- result = toplevel.run ()
-
- rc = bb.buttonPressed (result)
-
- if rc == TEXT_BACK_CHECK:
- screen.popWindow()
- return INSTALL_BACK
-
- if rc == "customize":
-
- if self.disabled.selected():
- ButtonChoiceWindow(screen, _("Invalid Choice"),
- _("You cannot customize a disabled firewall."),
- buttons = [ TEXT_OK_STR ], width = 40)
- else:
- popbb = ButtonBar (screen, (TEXT_OK_BUTTON,))
-
- poplevel = GridFormHelp (screen, _("Customize Firewall Configuration"),
- "securitycustom", 1, 5)
- text = _("With a firewall, you may wish to allow access "
- "to specific services on your computer from "
- "others. Allow access to which services?")
-
- poplevel.add (TextboxReflowed(65, text), 0, 0, (0, 0, 0, 1))
-
- poplevel.add (popbb, 0, 4, (0, 0, 0, 0), growx = 1)
- poplevel.add (bigGrid, 0, 1, (0, 0, 0, 0), anchorLeft = 1)
-
-
- result2 = poplevel.run()
- rc2 = popbb.buttonPressed(result2)
-
- if rc2 == TEXT_OK_CHECK or result2 == TEXT_F12_CHECK:
- screen.popWindow()
-
- if rc == TEXT_OK_CHECK or result == TEXT_F12_CHECK:
- if self.disabled.selected():
- rc2 = self.intf.messageWindow(_("Warning - No Firewall"),
- _("If this system is attached directly to the Internet or "
- "is on a large public network, it is recommended that a "
- "firewall be configured to help prevent unauthorized "
- "access. However, you have selected not to "
- "configure a firewall. Choose \"Proceed\" to continue "
- "without a firewall."),
- type="custom", custom_icon="warning",
- custom_buttons=[_("_Back"), _("_Proceed")])
-
- if rc2 == 0:
- continue
- else:
- break
- else:
- break
-
- screen.popWindow()
-
- for (s, cb) in self.portboxes:
- s.set_enabled(cb.selected())
- if self.disabled.selected():
- firewall.enabled = 0
- else:
- firewall.enabled = 1
-
- return INSTALL_OK
-
- def radiocb(self, args):
- (firewall, widget) = args
- if widget == self.disabled:
- firewall.enabled = 0
- elif widget == self.enabled:
- firewall.enabled = 1
- else:
- raise RuntimeError, "never reached"
-
-
-
-class SELinuxWindow:
- def __call__(self, screen, intf, network, firewall, security):
- if flags.selinux == 0:
- log("selinux disabled, not showing selinux config screen")
- return INSTALL_NOOP
-
- self.intf = intf
-
- toplevel = GridFormHelp (screen, _("Security Enhanced Linux"),
- "selinux", 1, 5)
- text = _("Security Enhanced Linux (SELinux) "
- "provides finer-grained "
- "security controls than those available "
- "in a traditional Linux system. It can "
- "be set up in a disabled state, a state "
- "which only warns about things which would "
- "be denied, or a fully active state.")
-
- toplevel.add(TextboxReflowed(50, text), 0, 0, (0,0,0,1))
-
-
- grid = Grid(3, 1)
- disable = SingleRadioButton(_("Disabled"), None, (security.getSELinux() == 0))
- toplevel.add(disable, 0, 1, (0,0,0,0))
- warn = SingleRadioButton(_("Warn"), disable, (security.getSELinux() == 1))
- toplevel.add(warn, 0, 2, (0,0,0,0))
- enable = SingleRadioButton(_("Active"), warn, (security.getSELinux() == 2))
- toplevel.add(enable, 0, 3, (0,0,0,1))
-
- bb = ButtonBar (screen, (TEXT_OK_BUTTON, TEXT_BACK_BUTTON))
- toplevel.add(bb, 0, 4, (0, 0, 0, 0), growx = 1)
-
- while 1:
- result = toplevel.run()
-
- rc = bb.buttonPressed (result)
-
- if rc == TEXT_BACK_CHECK:
- screen.popWindow()
- return INSTALL_BACK
-
- break
-
- if enable.selected():
- security.setSELinux(2)
- elif warn.selected():
- security.setSELinux(1)
- elif disable.selected():
- security.setSELinux(0)
-
- screen.popWindow()
- return INSTALL_OK
-
diff --git a/textw/network_text.py b/textw/network_text.py
index c1734c4f5..33a6acfc7 100644
--- a/textw/network_text.py
+++ b/textw/network_text.py
@@ -322,6 +322,14 @@ class NetworkGlobalWindow:
network.ternaryNS = val
break
+ # Initialize firewall and SELinux settings to our strict defaults
+ # but only if we're not doing a kickstart install. This is as
+ # good a place as any for this stuff.
+ if id.instClass.name != "kickstart":
+ import security
+ id.instClass.setFirwall (id, ports = ["22:tcp"])
+ id.instClass.setSELinux (id, security.SEL_ENFORCING)
+
screen.popWindow()
return INSTALL_OK