Name : perl-IPTables-Parse
| |
Version : 1.6
| Vendor : obs://build_opensuse_org/devel:languages:perl
|
Release : lp155.1.1
| Date : 2023-07-20 16:22:22
|
Group : Development/Libraries/Perl
| Source RPM : perl-IPTables-Parse-1.6-lp155.1.1.src.rpm
|
Size : 0.05 MB
| |
Packager : https://www_suse_com/
| |
Summary : Perl extension for parsing iptables and ip6tables policies
|
Description :
The \'IPTables::Parse\' package provides an interface to parse iptables or ip6tables rules on Linux systems through the direct execution of iptables/ip6tables commands, or from parsing a file that contains an iptables/ip6tables policy listing. Note that the \'firewalld\' infrastructure on Fedora21 is also supported through execution of the \'firewall-cmd\' binary. By default, the path to iptables is assumed to be \'/sbin/iptables\', but if the firewall is \'firewalld\', then the \'/usr/bin/firewall-cmd\' is used.
With this module, you can get the current policy applied to a table/chain, look for a specific user-defined chain, check for a default DROP policy, or determine whether or not a default LOG rule exists. Also, you can get a listing of all rules in a chain with each rule parsed into its own hash.
Note that if you initialize the IPTables::Parse object with the \'ipt_rules_file\' key, then all parsing routines will open the specified file for iptables rules data. So, you can create this file with a command like \'iptables -t filter -nL -v > ipt.rules\', and then initialize the object with IPTables::Parse->new(\'ipt_rules_file\' => \'ipt.rules\'). Further, if you are running on a system without iptables installed, but you have an iptables policy written to the ipt.rules file, then you can pass in \'skip_ipt_exec_check=>1\' in order to analyze the file without having IPTables::Parse check for the iptables binary.
In summary, in addition to the hash keys mentioned above, optional keys that can be passed to new() include \'iptables\' (set path to iptables binary), \'firewall_cmd\' (set path to \'firewall-cmd\' binary for systems with \'firewalld\'), \'fwd_args\' (set \'firewall-cmd\' usage args; defaults to \'--direct --passthrough ipv4\'), \'ipv6\' (set IPv6 mode for ip6tables), \'debug\', \'verbose\', and \'lockless_ipt_exec\' (disable usage of the iptables \'-w\' argument that acquires an exclusive lock on command execution).
|
RPM found in directory: /packages/linux-pbone/ftp5.gwdg.de/pub/opensuse/repositories/devel:/languages:/perl:/CPAN-I/15.5/noarch |