]> git.proxmox.com Git - pve-firewall.git/blobdiff - src/PVE/API2/Firewall/Aliases.pm
grammar fix: s/does not exists/does not exist/g
[pve-firewall.git] / src / PVE / API2 / Firewall / Aliases.pm
index 86393e6d29192b03bf485997475e6a758b9380c2..2a66abdbbe72d47ff179f10cddfa37e0e64ca13f 100644 (file)
@@ -9,16 +9,20 @@ use PVE::Firewall;
 
 use base qw(PVE::RESTHandler);
 
-my $api_properties = { 
+my $api_properties = {
     cidr => {
        description => "Network/IP specification in CIDR format.",
-       type => 'string', format => 'IPv4orCIDR',
+       type => 'string', format => 'IPorCIDR',
     },
     name => get_standard_option('pve-fw-alias'),
+    rename => get_standard_option('pve-fw-alias', {
+       description => "Rename an existing alias.",
+       optional => 1,
+    }),
     comment => {
        type => 'string',
        optional => 1,
-    }
+    },
 };
 
 sub load_config {
@@ -35,6 +39,12 @@ sub save_aliases {
     die "implement this in subclass";
 }
 
+sub rule_env {
+    my ($class, $param) = @_;
+
+    die "implement this in subclass";
+}
+
 my $additional_param_hash = {};
 
 sub additional_parameters {
@@ -71,6 +81,7 @@ sub register_get_aliases {
        path => '',
        method => 'GET',
        description => "List aliases",
+       permissions => PVE::Firewall::rules_audit_permissions($class->rule_env()),
        parameters => {
            additionalProperties => 0,
            properties => $properties,
@@ -86,7 +97,7 @@ sub register_get_aliases {
                        type => 'string',
                        optional => 1,
                    },
-                   digest => get_standard_option('pve-config-digest', { optional => 0} ),      
+                   digest => get_standard_option('pve-config-digest', { optional => 0} ),
                },
            },
            links => [ { rel => 'child', href => "{name}" } ],
@@ -116,6 +127,7 @@ sub register_create_alias {
        path => '',
        method => 'POST',
        description => "Create IP or Network Alias.",
+       permissions => PVE::Firewall::rules_modify_permissions($class->rule_env()),
        protected => 1,
        parameters => {
            additionalProperties => 0,
@@ -128,10 +140,10 @@ sub register_create_alias {
            my ($fw_conf, $aliases) = $class->load_config($param);
 
            my $name = lc($param->{name});
-           
-           raise_param_exc({ name => "alias '$param->{name}' already exists" }) 
+
+           raise_param_exc({ name => "alias '$param->{name}' already exists" })
                if defined($aliases->{$name});
-           
+
            my $data = { name => $param->{name}, cidr => $param->{cidr} };
            $data->{comment} = $param->{comment} if $param->{comment};
 
@@ -149,13 +161,13 @@ sub register_read_alias {
     my $properties = $class->additional_parameters();
 
     $properties->{name} = $api_properties->{name};
-    $properties->{cidr} = $api_properties->{cidr};
-    
+
     $class->register_method({
        name => 'read_alias',
        path => '{name}',
        method => 'GET',
        description => "Read alias.",
+       permissions => PVE::Firewall::rules_audit_permissions($class->rule_env()),
        parameters => {
            additionalProperties => 0,
            properties => $properties,
@@ -181,6 +193,7 @@ sub register_update_alias {
     my $properties = $class->additional_parameters();
 
     $properties->{name} = $api_properties->{name};
+    $properties->{rename} = $api_properties->{rename};
     $properties->{cidr} = $api_properties->{cidr};
     $properties->{comment} = $api_properties->{comment};
     $properties->{digest} = get_standard_option('pve-config-digest');
@@ -190,6 +203,7 @@ sub register_update_alias {
        path => '{name}',
        method => 'PUT',
        description => "Update IP or Network alias.",
+       permissions => PVE::Firewall::rules_modify_permissions($class->rule_env()),
        protected => 1,
        parameters => {
            additionalProperties => 0,
@@ -216,7 +230,20 @@ sub register_update_alias {
 
            $aliases->{$name} = $data;
 
+           my $rename = $param->{rename};
+           $rename = lc($rename) if $rename;
+
+           if ($rename && ($name ne $rename)) {
+               raise_param_exc({ name => "alias '$param->{rename}' already exists" })
+                   if defined($aliases->{$rename});
+               $aliases->{$name}->{name} = $param->{rename};
+               $aliases->{$rename} = $aliases->{$name};
+               delete $aliases->{$name};
+           }
+
            $class->save_aliases($param, $fw_conf, $aliases);
+
+           return undef;
        }});
 }
 
@@ -226,7 +253,6 @@ sub register_delete_alias {
     my $properties = $class->additional_parameters();
 
     $properties->{name} = $api_properties->{name};
-    $properties->{cidr} = $api_properties->{cidr};
     $properties->{digest} = get_standard_option('pve-config-digest');
 
     $class->register_method({
@@ -234,6 +260,7 @@ sub register_delete_alias {
        path => '{name}',
        method => 'DELETE',
        description => "Remove IP or Network alias.",
+       permissions => PVE::Firewall::rules_modify_permissions($class->rule_env()),
        protected => 1,
        parameters => {
            additionalProperties => 0,
@@ -253,7 +280,7 @@ sub register_delete_alias {
            delete $aliases->{$name};
 
            $class->save_aliases($param, $fw_conf, $aliases);
-           
+
            return undef;
        }});
 }
@@ -275,6 +302,12 @@ use warnings;
 
 use base qw(PVE::API2::Firewall::AliasesBase);
 
+sub rule_env {
+    my ($class, $param) = @_;
+
+    return 'cluster';
+}
+
 sub load_config {
     my ($class, $param) = @_;
 
@@ -293,4 +326,80 @@ sub save_aliases {
 
 __PACKAGE__->register_handlers();
 
+package PVE::API2::Firewall::VMAliases;
+
+use strict;
+use warnings;
+use PVE::JSONSchema qw(get_standard_option);
+
+use base qw(PVE::API2::Firewall::AliasesBase);
+
+sub rule_env {
+    my ($class, $param) = @_;
+
+    return 'vm';
+}
+
+__PACKAGE__->additional_parameters({
+    node => get_standard_option('pve-node'),
+    vmid => get_standard_option('pve-vmid'),
+});
+
+sub load_config {
+    my ($class, $param) = @_;
+
+    my $cluster_conf = PVE::Firewall::load_clusterfw_conf();
+    my $fw_conf = PVE::Firewall::load_vmfw_conf($cluster_conf, 'vm', $param->{vmid});
+    my $aliases = $fw_conf->{aliases};
+
+    return ($fw_conf, $aliases);
+}
+
+sub save_aliases {
+    my ($class, $param, $fw_conf, $aliases) = @_;
+
+    $fw_conf->{aliases} = $aliases;
+    PVE::Firewall::save_vmfw_conf($param->{vmid}, $fw_conf);
+}
+
+__PACKAGE__->register_handlers();
+
+package PVE::API2::Firewall::CTAliases;
+
+use strict;
+use warnings;
+use PVE::JSONSchema qw(get_standard_option);
+
+use base qw(PVE::API2::Firewall::AliasesBase);
+
+sub rule_env {
+    my ($class, $param) = @_;
+
+    return 'ct';
+}
+
+__PACKAGE__->additional_parameters({
+    node => get_standard_option('pve-node'),
+    vmid => get_standard_option('pve-vmid'),
+});
+
+sub load_config {
+    my ($class, $param) = @_;
+
+    my $cluster_conf = PVE::Firewall::load_clusterfw_conf();
+    my $fw_conf = PVE::Firewall::load_vmfw_conf($cluster_conf, 'ct', $param->{vmid});
+    my $aliases = $fw_conf->{aliases};
+
+    return ($fw_conf, $aliases);
+}
+
+sub save_aliases {
+    my ($class, $param, $fw_conf, $aliases) = @_;
+
+    $fw_conf->{aliases} = $aliases;
+    PVE::Firewall::save_vmfw_conf($param->{vmid}, $fw_conf);
+}
+
+__PACKAGE__->register_handlers();
+
 1;