from gtk import * from iw_gui import * from isys import * from translate import _, N_ import checklist class FirewallWindow (InstallWindow): windowTitle = N_("Firewall Configuration") htmlTag = "securitylevel" def __init__ (self, ics): InstallWindow.__init__ (self, ics) def getNext (self): if not self.__dict__.has_key("radio3"): return None if self.radio3.get_active (): self.firewall.enabled = 0 self.firewall.policy = 1 else: if self.radio1.get_active (): self.firewall.policy = 0 self.firewall.enabled = 1 elif self.radio2.get_active (): self.firewall.policy = 1 self.firewall.enabled = 1 if self.radio4.get_active (): self.firewallState = 0 if self.radio5.get_active (): self.firewallState = 1 count = 0 self.firewall.trustdevs = [] for device in self.devices: (val, row_data, header) = self.trusted.get_row_data (count) if val == 1: self.firewall.trustdevs.append(device) count = count + 1 for i in range(6): (val, row_data, header) = self.incoming.get_row_data (i) if row_data == "DHCP": self.firewall.dhcp = val elif row_data == "SSH": self.firewall.ssh = val elif row_data == "Telnet": self.firewall.telnet = val elif row_data == "WWW (HTTP)": self.firewall.http = val elif row_data == "Mail (SMTP)": self.firewall.smtp = val elif row_data == "FTP": self.firewall.ftp = val portstring = string.strip(self.ports.get_text()) portlist = "" bad_token_found = 0 bad_token = "" if portstring != "": tokens = string.split(portstring, ',') for token in tokens: try: if string.index(token,':'): #- if there's a colon in the token, it's valid parts = string.split(token, ':') if len(parts) > 2: #- We've found more than one colon. Break loop and raise an error. bad_token_found = 1 bad_token = token else: if parts[1] == 'tcp' or parts[1] == 'udp': #-upd and tcp are the only valid protocols if portlist == "": portlist = token else: portlist = portlist + ',' + token else: #- Found a protocol other than tcp or udp. Break loop bad_token_found = 1 bad_token = token pass except: if token != "": if portlist == "": portlist = token + ":tcp" else: portlist = portlist + ',' + token + ':tcp' else: pass if bad_token_found == 1: #- We've found a bad token...raise a warning from gnome.ui import * import gui self.textWin = GnomeDialog () self.textWin.set_modal (TRUE) vbox = GtkVBox() hbox = GtkHBox() hbox.pack_start (GnomePixmap ('/usr/share/pixmaps/gnome-warning.png'), FALSE) self.textWin.vbox.pack_start(hbox) hbox.pack_start(vbox) self.textWin.set_default_size (500, 200) self.textWin.set_usize (500, 200) self.textWin.set_position (WIN_POS_CENTER) label = GtkLabel((_("Warning: ")) + bad_token + (_(" is an invalid port."))) vbox.pack_start(label) label = GtkLabel(_("The format is 'port:protocol'. For example, '1234:udp'")) vbox.pack_start(label) self.textWin.append_button(_("Close")) self.textWin.button_connect (0, self.textWin.destroy) self.textWin.set_border_width(0) self.textWin.show_all() raise gui.StayOnScreen else: # all the port data looks good self.firewall.portlist = portlist def activate_firewall (self, widget): if self.radio3.get_active (): active = not (self.radio3.get_active()) self.radio4.set_sensitive (active) self.radio5.set_sensitive (active) self.trusted.set_sensitive(active) self.incoming.set_sensitive(active) self.ports.set_sensitive(active) self.label1.set_sensitive(active) self.label2.set_sensitive(active) self.label3.set_sensitive(active) else: self.radio4.set_sensitive (TRUE) self.radio5.set_sensitive (TRUE) if self.radio5.get_active (): self.trusted.set_sensitive(self.radio5.get_active()) self.incoming.set_sensitive(self.radio5.get_active()) self.ports.set_sensitive(self.radio5.get_active()) self.label1.set_sensitive(self.radio5.get_active()) self.label2.set_sensitive(self.radio5.get_active()) self.label3.set_sensitive(self.radio5.get_active()) else: self.trusted.set_sensitive(self.radio5.get_active()) self.incoming.set_sensitive(self.radio5.get_active()) self.ports.set_sensitive(self.radio5.get_active()) self.label1.set_sensitive(self.radio5.get_active()) self.label2.set_sensitive(self.radio5.get_active()) self.label3.set_sensitive(self.radio5.get_active()) def trusted_select_row(self, clist, event): try: row, col = self.trusted.get_selection_info (event.x, event.y) self.toggle_row(self.trusted, row) except: pass def incoming_select_row(self, clist, event): try: row, col = self.incoming.get_selection_info (event.x, event.y) self.toggle_row(self.incoming, row) except: pass def trusted_key_press (self, list, event): if event.keyval == ord(" ") and self.trusted.focus_row != -1: self.toggle_row (self.trusted, self.trusted.focus_row) def incoming_key_press (self, list, event): if event.keyval == ord(" ") and self.incoming.focus_row != -1: self.toggle_row (self.incoming, self.incoming.focus_row) def toggle_row (self, list, row): (val, row_data, header) = list.get_row_data(row) val = not val list.set_row_data(row, (val, row_data, header)) list._update_row (row) def getScreen (self, network, firewall): self.firewall = firewall self.network = network self.devices = self.network.available().keys() self.devices.sort() self.netCBs = {} box = GtkVBox (FALSE, 5) box.set_border_width (5) label = GtkLabel (_("Please choose your security level: ")) label.set_alignment (0.0, 0.5) label.set_line_wrap (TRUE) box.pack_start(label, FALSE) hbox = GtkHBox (FALSE) self.radio1 = GtkRadioButton (None, (_("High"))) self.radio2 = GtkRadioButton (self.radio1, (_("Medium"))) self.radio3 = GtkRadioButton (self.radio1, (_("No firewall"))) self.radio3.connect ("clicked", self.activate_firewall) hbox.pack_start (self.radio1) hbox.pack_start (self.radio2) hbox.pack_start (self.radio3) a = GtkAlignment () a.add (hbox) a.set (1.0, 0.5, 0.7, 1.0) box.pack_start (a, FALSE) hsep = GtkHSeparator () box.pack_start (hsep, FALSE) self.radio4 = GtkRadioButton (None, (_("Use default firewall rules"))) self.radio5 = GtkRadioButton (self.radio4, (_("Customize"))) self.radio4.set_active (TRUE) self.radio4.connect ("clicked", self.activate_firewall) self.radio5.connect ("clicked", self.activate_firewall) box.pack_start (self.radio4, FALSE) box.pack_start (self.radio5, FALSE) table = GtkTable (2, 3) box.pack_start (table) hbox = GtkHBox(FALSE, 10) self.label1 = GtkLabel (_("Trusted devices:")) self.label1.set_alignment (0.2, 0.0) self.trusted = checklist.CheckList(1) self.trusted.connect ('button_press_event', self.trusted_select_row) self.trusted.connect ("key_press_event", self.trusted_key_press) if self.devices != []: table.attach (self.label1, 0, 1, 0, 1, FILL, FILL, 5, 5) table.attach (self.trusted, 1, 2, 0, 1, EXPAND|FILL, FILL, 5, 5) count = 0 for device in self.devices: if self.firewall.trustdevs == []: self.trusted.append_row ((device, device), FALSE) else: if device in self.firewall.trustdevs: self.trusted.append_row ((device, device), TRUE) else: self.trusted.append_row ((device, device), FALSE) if self.network.netdevices[device].get('bootproto') == 'dhcp': self.firewall.dhcp = 1 count = count + 1 hbox = GtkHBox(FALSE, 10) self.label2 = GtkLabel (_("Allow incoming:")) self.label2.set_alignment (0.2, 0.0) self.incoming = checklist.CheckList(1) self.incoming.connect ('button_press_event', self.incoming_select_row) self.incoming.connect ("key_press_event", self.incoming_key_press) table.attach (self.label2, 0, 1, 1, 2, FILL, FILL, 5, 5) table.attach (self.incoming, 1, 2, 1, 2, EXPAND|FILL, FILL, 5, 5) self.list = ["DHCP", "SSH", "Telnet", "WWW (HTTP)", "Mail (SMTP)", "FTP"] count = 0 for item in self.list: self.incoming.append_row ((item, ""), FALSE) if item == "DHCP": self.incoming.set_row_data (count, (self.firewall.dhcp, item, item)) elif item == "SSH": self.incoming.set_row_data (count, (self.firewall.ssh, item, item)) elif item == "Telnet": self.incoming.set_row_data (count, (self.firewall.telnet, item, item)) elif item == "WWW (HTTP)": self.incoming.set_row_data (count, (self.firewall.http, item, item)) elif item == "Mail (SMTP)": self.incoming.set_row_data (count, (self.firewall.smtp, item, item)) elif item == "FTP": self.incoming.set_row_data (count, (self.firewall.ftp, item, item)) count = count + 1 self.label3 = GtkLabel (_("Other ports:")) self.ports = GtkEntry () table.attach (self.label3, 0, 1, 2, 3, FILL, FILL, 5, 5) table.attach (self.ports, 1, 2, 2, 3, EXPAND|FILL, FILL, 5, 5) if self.firewall.enabled == 0: self.radio3.set_active (TRUE) elif self.firewall.policy == 0: self.radio1.set_active (TRUE) elif self.firewall.policy == 1: self.radio2.set_active (TRUE) if self.firewall.portlist != "": self.ports.set_text (self.firewall.portlist) # XXX #if self.firewallState == 1: self.radio5.set_active(TRUE) #else: #self.trusted.set_sensitive(FALSE) #self.incoming.set_sensitive(FALSE) #self.ports.set_sensitive(FALSE) #self.label1.set_sensitive(FALSE) #self.label2.set_sensitive(FALSE) #self.label3.set_sensitive(FALSE) return box