fedi-meta/main.py

108 wiersze
4.6 KiB
Python
Czysty Zwykły widok Historia

2023-07-19 08:08:36 +00:00
from functions import plaintext_formatter, whois_lookup, iptables_generator, json_formatter, nginx_geo_formatter
2023-07-03 03:14:57 +00:00
import argparse
2023-06-30 05:40:29 +00:00
2023-07-19 06:31:17 +00:00
# Built in boolean parsing does not work as expected, so use this custom parser instead
def parse_boolean_from_string(string: str):
if string.lower() in ('yes', 'true', 't', 'y', '1'):
return True
elif string.lower() in ('no', 'false', 'f', 'n', '0'):
return False
else:
raise argparse.ArgumentTypeError('Boolean value expected.')
2023-06-30 05:40:29 +00:00
if __name__ == "__main__":
2023-07-19 02:54:39 +00:00
argParser: argparse.ArgumentParser = argparse.ArgumentParser()
2023-07-03 03:14:57 +00:00
argParser.add_argument("-f", "--format",
default="iptables",
const="iptables",
nargs="?",
type=str,
2023-07-19 08:08:36 +00:00
choices=("iptables", "plain", "jsonl", "nginx-geo"),
2023-07-03 03:14:57 +00:00
help="Output format of IP address list (default: %(default)s)")
2023-07-19 02:54:39 +00:00
argParser.add_argument("-p", "--policy",
default="DROP",
const="DROP",
nargs="?",
type=str,
2023-07-19 05:30:02 +00:00
choices=("DROP", "REJECT", "ACCEPT", "DNAT"),
2023-07-19 04:24:51 +00:00
help="iptables policy for handling incoming packets (default: %(default)s)")
2023-07-19 05:30:02 +00:00
argParser.add_argument("-P", "--protocol",
default="tcp",
const="tcp",
nargs="?",
type=str,
choices=("tcp", "udp", "sctp", "dccp"),
help="iptables protocol type (only valid when policy is DNAT) (default: %(default)s)")
argParser.add_argument("-d", "--destination",
default=":8080",
const=":8080",
nargs="?",
type=str,
help="iptables destination route (only valid when policy is DNAT) (default: %(default)s)")
2023-07-19 06:31:17 +00:00
argParser.add_argument("--handle-firewall",
default=True,
const=True,
nargs="?",
type=parse_boolean_from_string,
help="iptables handle opening/closing port for you (only valid when policy is DNAT and destination is self) (default: %(default)s)")
2023-07-19 04:24:51 +00:00
argParser.add_argument("--iptables-path",
default="iptables",
const="iptables",
nargs="?",
type=str,
help="iptables path (default: %(default)s)")
argParser.add_argument("--ip6tables-path",
default="ip6tables",
const="ip6tables",
nargs="?",
type=str,
help="ip6tables path (default: %(default)s)")
argParser.add_argument("--sudo-path",
default="sudo",
const="sudo",
nargs="?",
type=str,
help="sudo path (default: %(default)s)")
2023-07-19 09:17:01 +00:00
argParser.add_argument("--nginx-geo-input-var",
default="http_x_forwarded_for",
const="http_x_forwarded_for",
nargs="?",
type=str,
help="The variable Nginx will read to determine one's real ip address (default: %(default)s)")
2023-07-19 02:54:39 +00:00
2023-07-03 03:14:57 +00:00
args = argParser.parse_args()
2023-06-30 05:40:29 +00:00
addresses: list[dict] = []
# Get IP Addresses To Ban
for address in whois_lookup.get_ips():
addresses.append(address)
# Generate IP Table Rules
2023-07-03 03:14:57 +00:00
if args.format == "iptables":
# IP Tables Commands
2023-07-19 02:54:39 +00:00
for rule in iptables_generator.generate_iptable_rules(addresses=addresses, args=args):
2023-07-03 03:14:57 +00:00
print(rule)
elif args.format == "plain":
# Just Plain Addresses
2023-07-19 02:54:39 +00:00
for address in plaintext_formatter.format_addresses(addresses=addresses, args=args):
2023-07-03 03:14:57 +00:00
print(address)
elif args.format == "jsonl":
# JSON Formatted Addresses
2023-07-19 02:54:39 +00:00
for address in json_formatter.format_addresses(addresses=addresses, args=args):
2023-07-03 03:14:57 +00:00
print(address)
2023-07-19 08:08:36 +00:00
elif args.format == "nginx-geo":
# Nginx Config Formatted Addresses
for address in nginx_geo_formatter.format_addresses(addresses=addresses, args=args):
print(address)
2023-07-03 03:14:57 +00:00
else:
print(f"Unknown format: `{args.format}`")