summaryrefslogtreecommitdiffstats
path: root/Scripts/revert_tap_wireless_int.sh
diff options
context:
space:
mode:
authorsuchinton2001 <suchinton.2001@gmail.com>2023-10-15 23:30:36 +0530
committerJan-Simon Moeller <jsmoeller@linuxfoundation.org>2023-10-19 16:19:32 +0000
commit20fe2d131df0041e121eccaf4fc58d4ac88dfbbc (patch)
treed555cd863e644014e9eb7a3fb9b759de246b6c2e /Scripts/revert_tap_wireless_int.sh
parente875973f63fc9a9582e957eb7264a4a589b78a97 (diff)
agl-demo-control-panel: Refactor Settings, Config and UI scaling
V1: - Add template to specify new configs in config.ini - Add drop-down to load all configurations specified in config.ini - Add new assets and refine UI elements (Scaling issue fixed) - Add size grip to main window - Add options in settings to configure port and AGL's CA.pem file - Removed unused or redundant files V2: - Check for user configs agl-demo-control-panel.ini & config.ini before resorting to default config.ini - Check for CA.pem and jwt tokens in default paths - Add new fields in settings for CA.pem file, jwt token path, TLS Server name - Fix crash in dashboard.py module due to icon.availableSizes() V3: Add Start/Stop states for the client V4: Block subscription event updates to the UI when values are changed on the control panel Bug-AGL: SPEC-4905 Signed-off-by: suchinton2001 <suchinton.2001@gmail.com> Change-Id: Id7883ba3bc88248dabb58d54e6e931f6d365fd54
Diffstat (limited to 'Scripts/revert_tap_wireless_int.sh')
-rw-r--r--Scripts/revert_tap_wireless_int.sh53
1 files changed, 0 insertions, 53 deletions
diff --git a/Scripts/revert_tap_wireless_int.sh b/Scripts/revert_tap_wireless_int.sh
deleted file mode 100644
index b23cf3a..0000000
--- a/Scripts/revert_tap_wireless_int.sh
+++ /dev/null
@@ -1,53 +0,0 @@
-#!/bin/bash
-
-BRIDGE=br0
-NETWORK=10.10.10.0
-NETMASK=255.255.255.0
-GATEWAY=10.10.10.1
-DHCPRANGE=10.10.10.100,10.10.10.254
-
-# Delete the bridge interface
-ip link delete dev $BRIDGE type bridge
-
-# Disable IP forwarding
-sysctl -w net.ipv4.ip_forward=0 > /dev/null 2>&1
-
-# Flush existing iptables rules and set default policies to ACCEPT
-iptables --flush
-iptables -t nat -F
-iptables -X
-iptables -Z
-iptables -P OUTPUT ACCEPT
-iptables -P INPUT ACCEPT
-iptables -P FORWARD ACCEPT
-
-# Allow DHCP and DNS traffic on the network interface
-iptables -A INPUT -i $BRIDGE -p tcp -m tcp --dport 67 -j ACCEPT
-iptables -A INPUT -i $BRIDGE -p udp -m udp --dport 67 -j ACCEPT
-iptables -A INPUT -i $BRIDGE -p tcp -m tcp --dport 53 -j ACCEPT
-iptables -A INPUT -i $BRIDGE -p udp -m udp --dport 53 -j ACCEPT
-
-# Allow forwarding of packets between the network and the bridge
-iptables -A FORWARD -s $NETWORK/$NETMASK -i $BRIDGE -j ACCEPT
-iptables -A FORWARD -d $NETWORK/$NETMASK -o $BRIDGE -m state --state RELATED,ESTABLISHED -j ACCEPT
-
-# Delete the network address translation (NAT) rules
-iptables -t nat -D POSTROUTING -s $NETWORK/$NETMASK -d $NETWORK/$NETMASK -j ACCEPT
-iptables -t nat -D POSTROUTING -s $NETWORK/$NETMASK -j MASQUERADE
-
-# Delete the dnsmasq process
-pid_file="/var/run/qemu-dnsmasq-$BRIDGE.pid"
-if [ -f "$pid_file" ]; then
- kill $(cat "$pid_file")
- rm "$pid_file"
-fi
-
-# Remove the wireless interface from the forwarding rules
-iptables -D FORWARD -i $BRIDGE -o $WIRELESS -j ACCEPT
-iptables -t nat -D POSTROUTING -o $WIRELESS -j MASQUERADE
-
-# Allow known traffic from the wireless interface to return to the network interface
-iptables -D FORWARD -i $WIRELESS -o $BRIDGE -m state --state RELATED,ESTABLISHED -j ACCEPT
-
-echo "Reverted back to default configuration."
-