This file is indexed.

/usr/share/augeas/lenses/dist/lokkit.aug is in augeas-lenses 1.10.1-2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
module Lokkit =
  autoload xfm

(* Module: Lokkit
   Parse the config file for lokkit from system-config-firewall
*)

let comment = Util.comment
let empty = Util.empty
let eol = Util.eol
let spc = Util.del_ws_spc
let dels = Util.del_str

let eq = del /[ \t=]+/ "="
let token = store /[a-zA-Z0-9][a-zA-Z0-9-]*/

let long_opt (n:regexp) =
  [ dels "--" . key n . eq . token . eol ]

let flag (n:regexp) =
  [ dels "--" . key n . eol ]

let option (l:string) (s:string) =
  del ("--" . l | "-" . s) ("--" . l) . label l . eq

let opt (l:string) (s:string) =
  [ option l s . token . eol ]

(* trust directive
   -t <interface>, --trust=<interface>
*)
let trust =
  [ option "trust" "t" . store Rx.device_name . eol ]

(* port directive
   -p <port>[-<port>]:<protocol>, --port=<port>[-<port>]:<protocol>
*)
let port =
  let portnum = store /[0-9]+/ in
  [ option "port" "p" .
    [ label "start" . portnum ] .
    (dels "-" . [ label "end" . portnum])? .
    dels ":" . [ label "protocol" . token ] . eol ]

(* custom_rules directive
   --custom-rules=[<type>:][<table>:]<filename>
*)
let custom_rules =
  let types = store /ipv4|ipv6/ in
  let tables = store /mangle|nat|filter/ in
  let filename = store /[^ \t\n:=][^ \t\n:]*/ in
  [ dels "--custom-rules" . label "custom-rules" . eq .
      [ label "type" . types . dels ":" ]? .
      [ label "table" . tables . dels ":"]? .
      filename . eol ]

(* forward_port directive
   --forward-port=if=<interface>:port=<port>:proto=<protocol>[:toport=<destination port>][:toaddr=<destination address>]
*)
let forward_port =
  let elem (n:string) (v:lens) =
    [ key n . eq . v ] in
  let ipaddr = store /[0-9.]+/ in
  let colon = dels ":" in
  [ dels "--forward-port" . label "forward-port" . eq .
      elem "if" token . colon .
      elem "port" token . colon .
      elem "proto" token .
      (colon . elem "toport" token)? .
      (colon . elem "toaddr" ipaddr)? . eol ]

let entry =
  long_opt /selinux|selinuxtype|addmodule|removemodule|block-icmp/
 |flag /enabled|disabled/
 |opt "service" "s"
 |port
 |trust
 |opt "masq" "m"
 |custom_rules
 |forward_port

let lns = (comment|empty|entry)*

let xfm = transform lns (incl "/etc/sysconfig/system-config-firewall")