about summary refs log tree commit diff stats
path: root/build1
blob: 2551cfeb1c1438e52a14b8ad8a561be320af9df7 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
#!/bin/sh
# Alternative to build0 that supports a --until flag to include only a subset
# of layers.
#   $ ./build1 --until 050
UNTIL_LAYER=${2:-zzz}

set -v
set -e  # stop immediately on error

# Some environment variables that can be passed in. For example, to turn off
# optimization:
#   $ CFLAGS=-g ./build1
test "$CXX" || export CXX=c++
test "$CC" || export CC=cc
test "$CFLAGS" || export CFLAGS="-g -O2"
export CFLAGS="$CFLAGS -Wall -Wextra -ftrapv -fno-strict-aliasing"

# Outline:
# [0-9]*.cc -> mu.cc -> mu_bin
# (layers)   |        |
#          tangle   $CXX

$CXX $CFLAGS enumerate/enumerate.cc -o enumerate/enumerate

cd tangle
  # auto-generate various lists (ending in '_list' by convention) {
  # list of types
  {
    grep -h "^struct .* {" [0-9]*.cc  |sed 's/\(struct *[^ ]*\).*/\1;/'
    grep -h "^typedef " [0-9]*.cc
  }  > type_list
  # list of function declarations, so I can define them in any order
  grep -h "^[^ #].*) {" [0-9]*.cc  |sed 's/ {.*/;/'  > function_list
  # list of code files to compile
  ls [0-9]*.cc  |grep -v "\.test\.cc$"  |sed 's/.*/#include "&"/'  > file_list
  # list of test files to compile
  ls [0-9]*.test.cc  |sed 's/.*/#include "&"/'  > test_file_list
  # list of tests to run
  grep -h "^[[:space:]]*void test_" [0-9]*.cc  |sed 's/^\s*void \(.*\)() {$/\1,/'  > test_list
  grep -h "^\s*void test_" [0-9]*.cc  |sed 's/^\s*void \(.*\)() {.*/"\1",/'  > test_name_list
  # }
  # Now that we have all the _lists, compile 'tangle'
  $CXX $CFLAGS boot.cc -o tangle
  ./tangle test
cd ..

cd termbox
  $CC $CFLAGS -c termbox.c
  $CC $CFLAGS -c utf8.c
  ar rcs libtermbox.a *.o
cd ..

LAYERS=$(./enumerate/enumerate --until $UNTIL_LAYER  |grep '\.cc$')
./tangle/tangle $LAYERS  > mu.cc
# auto-generate function declarations, so I can define them in any order
# functions start out unindented, have all args on the same line, and end in ') {'
#
#                                      \/ ignore methods
grep -h "^[^[:space:]#].*) {$" mu.cc  |grep -v ":.*("  |sed 's/ {.*/;/'  > function_list
# auto-generate list of tests to run
grep -h "^\s*void test_" mu.cc  |sed 's/^\s*void \(.*\)() {.*/\1,/'  > test_list
grep -h "^\s*void test_" mu.cc  |sed 's/^\s*void \(.*\)() {.*/"\1",/'  > test_name_list
$CXX $CFLAGS mu.cc termbox/libtermbox.a -o mu_bin

## [0-9]*.mu -> core.mu

MU_LAYERS=$(./enumerate/enumerate --until $UNTIL_LAYER  |grep '\.mu$') || exit 0  # ok if no .mu files
cat $MU_LAYERS  > core.mu
class="p"></li> <li>Define exceptions to those default policies in /etc/shorewall/rules.</li> </ul> <p>Edit <a href="../conf/etc/shorewall/shorewall.conf">/etc/shorewall/shorewall.conf</a></p> <pre> ############################################################################### # S T A R T U P E N A B L E D ############################################################################### STARTUP_ENABLED=Yes </pre> <h4 id="shorewall-interfaces">2.3.5. Configure Interfaces</h4> <p>Show defoult route, last should be your external interface;</p> <pre> # ip route ls </pre> <p>This example assumes enp8s0 is connected to router and wlp7s0 is wireless access point.</p> <p>Edit <a href="../conf/etc/shorewall/interfaces">/etc/shorewall/interfaces</a></p> <pre> ############################################################################### #ZONE INTERFACE OPTIONS net enp8s0 dhcp,tcpflags,nosmurfs,routefilter,logmartians,sourceroute=0 loc wlp7s0 tcpflags,nosmurfs,routefilter,logmartians </pre> <p>Edit <a href="../conf/etc/shorewall/stoppedrules">/etc/shorewall/stoppedrules</a></p> <pre> ############################################################################### #ACTION SOURCE DEST PROTO DEST SOURCE # PORT(S) PORT(S) ACCEPT enp3s0 - ACCEPT - enp3s0 </pre> <h4 id="shorewall-zones">2.3.3. Configure Zones</h4> <p>Shorewall recognizes the firewall system as its own zone, as can be seen on zones defined by two-interfaces example;</p> <p>Edit <a href="../conf/etc/shorewall/zones">/etc/shorewall/zones</a></p> <pre> ############################################################################### #ZONE TYPE OPTIONS IN OUT # OPTIONS OPTIONS fw firewall net ipv4 loc ipv4 </pre> <h4 id="shorewall-policy">2.3.4. Configure Policy</h4> <p>Change default /etc/shorewall/policy this example will limit witch connections are allow to and from firewall, default policy will be drop;</p> <p>Edit <a href="../conf/etc/shorewall/policy">/etc/shorewall/policy</a></p> <pre> ############################################################################## #SOURCE DEST POLICY LOG LEVEL LIMIT:BURST loc net ACCEPT info net all DROP warning $FW net DROP warning loc $FW DROP warning $FW loc DROP warning # THE FOLLOWING POLICY MUST BE LAST all all REJECT warning </pre> <h4 id="shorewall-snat">2.3.6. SNAT/Masquerading</h4> <p>In Shorewall, both Masquerading and SNAT are configured with entries in the /etc/shorewall/masq file. You will normally use Masquerading if your external IP is dynamic and SNAT if the IP is static.</p> <p>Since <a href="../conf/etc/rc.d/net">/etc/rc.d/net</a> configured enp8s0 static, change /etc/shorewall/masq so that uses SNAT;</p> <p>Edit <a href="../conf/etc/shorewall/masq">/etc/shorewall/masq</a></p> <pre> ####################################################################################### #INTERFACE:DEST SOURCE ADDRESS PROTO PORT(S) IPSEC MARK # wlp7s0 10.0.0.0/24 192.168.1.254 </pre> <h4 id="shorewall-dnat">2.3.7. DNAT</h4> <p>Destination Network Address Translation are defined in /etc/shorewall/rules;</p> <h4 id="shorewall-rules">2.3.8. Rules</h4> <p>Example <a href="../conf/etc/shorewall/rules">/etc/shorewall/rules</a> file.</p> <h4 id="shorewall-log">2.3.9. Logging</h4> <pre> $ sudo mkdir /var/log/shorewall </pre> <p>Example of syslog-ng configuration for shorewall;</p> <pre> destination d_shorewall_warn { file ("/var/log/shorewall/warn.log"); }; destination d_shorewall_info { file ("/var/log/shorewall/info.log"); }; filter f_shorewall_warn { level (warn) and match ("Shorewall" value("MESSAGE")); }; filter f_shorewall_info { level (info) and match ("Shorewall" value("MESSAGE")); }; log { source (s_kernel); filter (f_shorewall_warn); destination (d_shorewall_warn); flags(final);}; log { source (s_kernel); filter (f_shorewall_info); destination (d_shorewall_info); flags(final);}; </pre>