1
0
Fork 0
mirror of https://github.com/Ysurac/openmptcprouter-feeds.git synced 2025-02-15 03:51:51 +00:00

Force enable on some OMR-ByPass rules (#554)

This commit is contained in:
suyuan 2024-10-15 18:17:04 +08:00 committed by GitHub
commit f2cb675fee
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -145,6 +145,14 @@ _bypass_domain() {
fi fi
if [ "$(uci -q get dhcp.omr_dst_bypass_$intf | grep /$domain/)" = "" ]; then if [ "$(uci -q get dhcp.omr_dst_bypass_$intf | grep /$domain/)" = "" ]; then
uci -q add_list dhcp.omr_dst_bypass_$intf.domain="$domain" uci -q add_list dhcp.omr_dst_bypass_$intf.domain="$domain"
uci -q set firewall.omr_dst_bypass_${type}_4.enabled='1'
uci -q set firewall.omr_dst_bypass_${type}_dstip_4.enabled='1'
uci -q set firewall.omr_dst_bypass_${type}_dstip_4_accept.enabled='1'
if [ "$noipv6" != "1" ]; then
uci -q set firewall.omr_dst_bypass_${type}_6.enabled='1'
uci -q set firewall.omr_dst_bypass_${type}_dstip_6.enabled='1'
uci -q set firewall.omr_dst_bypass_${type}_dstip_6_accept.enabled='1'
fi
add_domains="true" add_domains="true"
fi fi
if [ "$(uci -q get dhcp.@dnsmasq[0].noipv6 | grep /$domain/)" = "" ] && [ "$noipv6" = "1" ]; then if [ "$(uci -q get dhcp.@dnsmasq[0].noipv6 | grep /$domain/)" = "" ] && [ "$noipv6" = "1" ]; then
@ -430,6 +438,7 @@ _bypass_proto_without_ndpi() {
set firewall.bypass_$proto.name="bypass_$proto" set firewall.bypass_$proto.name="bypass_$proto"
set firewall.bypass_$proto.match='dest_ip' set firewall.bypass_$proto.match='dest_ip'
set firewall.bypass_$proto.family='ipv4' set firewall.bypass_$proto.family='ipv4'
set firewall.bypass_$proto.enabled='1'
set firewall.bypass_$proto_rule=rule set firewall.bypass_$proto_rule=rule
set firewall.bypass_$proto_rule.name="bypass_$proto_rule" set firewall.bypass_$proto_rule.name="bypass_$proto_rule"
set firewall.bypass_$proto_rule.src='lan' set firewall.bypass_$proto_rule.src='lan'
@ -438,6 +447,7 @@ _bypass_proto_without_ndpi() {
set firewall.bypass_$proto_rule.family='ipv4' set firewall.bypass_$proto_rule.family='ipv4'
set firewall.bypass_$proto_rule.target='MARK' set firewall.bypass_$proto_rule.target='MARK'
set firewall.bypass_$proto_rule.ipset="bypass_$proto" set firewall.bypass_$proto_rule.ipset="bypass_$proto"
set firewall.bypass_$proto_rule.enabled='1'
set firewall.bypass_$proto_rule.set_xmark="0x4539${intfid}" set firewall.bypass_$proto_rule.set_xmark="0x4539${intfid}"
commit firewall commit firewall
EOF EOF
@ -446,6 +456,7 @@ _bypass_proto_without_ndpi() {
set firewall.bypass6_$proto.name="bypass6_$proto" set firewall.bypass6_$proto.name="bypass6_$proto"
set firewall.bypass6_$proto.match='dest_ip' set firewall.bypass6_$proto.match='dest_ip'
set firewall.bypass6_$proto.family='ipv6' set firewall.bypass6_$proto.family='ipv6'
set firewall.bypass6_$proto.enabled='1'
set firewall.bypass6_$proto_rule=rule set firewall.bypass6_$proto_rule=rule
set firewall.bypass6_$proto_rule.name="bypass6_$proto_rule" set firewall.bypass6_$proto_rule.name="bypass6_$proto_rule"
set firewall.bypass6_$proto_rule.src='lan' set firewall.bypass6_$proto_rule.src='lan'
@ -455,6 +466,7 @@ _bypass_proto_without_ndpi() {
set firewall.bypass6_$proto_rule.target='MARK' set firewall.bypass6_$proto_rule.target='MARK'
set firewall.bypass6_$proto_rule.set_xmark="0x6539${intfid}" set firewall.bypass6_$proto_rule.set_xmark="0x6539${intfid}"
set firewall.bypass6_$proto_rule.ipset="bypass6_$proto" set firewall.bypass6_$proto_rule.ipset="bypass6_$proto"
set firewall.bypass6_$proto_rule.enabled='1'
commit firewall commit firewall
EOF EOF
#if [ "$intfid" != "" ]; then #if [ "$intfid" != "" ]; then