diff options
author | suchinton2001 <suchinton.2001@gmail.com> | 2023-10-15 23:30:36 +0530 |
---|---|---|
committer | Jan-Simon Moeller <jsmoeller@linuxfoundation.org> | 2023-10-19 16:19:32 +0000 |
commit | 20fe2d131df0041e121eccaf4fc58d4ac88dfbbc (patch) | |
tree | d555cd863e644014e9eb7a3fb9b759de246b6c2e /Scripts/revert_tap_wireless_int.sh | |
parent | e875973f63fc9a9582e957eb7264a4a589b78a97 (diff) |
agl-demo-control-panel: Refactor Settings, Config and UI scaling
V1:
- Add template to specify new configs in config.ini
- Add drop-down to load all configurations specified in config.ini
- Add new assets and refine UI elements (Scaling issue fixed)
- Add size grip to main window
- Add options in settings to configure port and AGL's CA.pem file
- Removed unused or redundant files
V2:
- Check for user configs agl-demo-control-panel.ini & config.ini
before resorting to default config.ini
- Check for CA.pem and jwt tokens in default paths
- Add new fields in settings for CA.pem file, jwt token path, TLS Server name
- Fix crash in dashboard.py module due to icon.availableSizes()
V3: Add Start/Stop states for the client
V4: Block subscription event updates to the UI when values are changed on the control panel
Bug-AGL: SPEC-4905
Signed-off-by: suchinton2001 <suchinton.2001@gmail.com>
Change-Id: Id7883ba3bc88248dabb58d54e6e931f6d365fd54
Diffstat (limited to 'Scripts/revert_tap_wireless_int.sh')
-rw-r--r-- | Scripts/revert_tap_wireless_int.sh | 53 |
1 files changed, 0 insertions, 53 deletions
diff --git a/Scripts/revert_tap_wireless_int.sh b/Scripts/revert_tap_wireless_int.sh deleted file mode 100644 index b23cf3a..0000000 --- a/Scripts/revert_tap_wireless_int.sh +++ /dev/null @@ -1,53 +0,0 @@ -#!/bin/bash - -BRIDGE=br0 -NETWORK=10.10.10.0 -NETMASK=255.255.255.0 -GATEWAY=10.10.10.1 -DHCPRANGE=10.10.10.100,10.10.10.254 - -# Delete the bridge interface -ip link delete dev $BRIDGE type bridge - -# Disable IP forwarding -sysctl -w net.ipv4.ip_forward=0 > /dev/null 2>&1 - -# Flush existing iptables rules and set default policies to ACCEPT -iptables --flush -iptables -t nat -F -iptables -X -iptables -Z -iptables -P OUTPUT ACCEPT -iptables -P INPUT ACCEPT -iptables -P FORWARD ACCEPT - -# Allow DHCP and DNS traffic on the network interface -iptables -A INPUT -i $BRIDGE -p tcp -m tcp --dport 67 -j ACCEPT -iptables -A INPUT -i $BRIDGE -p udp -m udp --dport 67 -j ACCEPT -iptables -A INPUT -i $BRIDGE -p tcp -m tcp --dport 53 -j ACCEPT -iptables -A INPUT -i $BRIDGE -p udp -m udp --dport 53 -j ACCEPT - -# Allow forwarding of packets between the network and the bridge -iptables -A FORWARD -s $NETWORK/$NETMASK -i $BRIDGE -j ACCEPT -iptables -A FORWARD -d $NETWORK/$NETMASK -o $BRIDGE -m state --state RELATED,ESTABLISHED -j ACCEPT - -# Delete the network address translation (NAT) rules -iptables -t nat -D POSTROUTING -s $NETWORK/$NETMASK -d $NETWORK/$NETMASK -j ACCEPT -iptables -t nat -D POSTROUTING -s $NETWORK/$NETMASK -j MASQUERADE - -# Delete the dnsmasq process -pid_file="/var/run/qemu-dnsmasq-$BRIDGE.pid" -if [ -f "$pid_file" ]; then - kill $(cat "$pid_file") - rm "$pid_file" -fi - -# Remove the wireless interface from the forwarding rules -iptables -D FORWARD -i $BRIDGE -o $WIRELESS -j ACCEPT -iptables -t nat -D POSTROUTING -o $WIRELESS -j MASQUERADE - -# Allow known traffic from the wireless interface to return to the network interface -iptables -D FORWARD -i $WIRELESS -o $BRIDGE -m state --state RELATED,ESTABLISHED -j ACCEPT - -echo "Reverted back to default configuration." - |