]>
git.proxmox.com Git - pve-firewall.git/blob - src/PVE/API2/Firewall/IPSet.pm
1 package PVE
::API2
::Firewall
::IPSetBase
;
5 use PVE
::Exception
qw(raise raise_param_exc);
6 use PVE
::JSONSchema
qw(get_standard_option);
10 use base
qw(PVE::RESTHandler);
12 my $api_properties = {
14 description
=> "Network/IP specification in CIDR format.",
15 type
=> 'string', format
=> 'IPv4orCIDR',
17 name
=> get_standard_option
('ipset-name'),
29 my ($class, $param) = @_;
31 die "implement this in subclass";
35 my ($class, $param, $fw_conf, $rules) = @_;
37 die "implement this in subclass";
40 my $additional_param_hash = {};
42 sub additional_parameters
{
43 my ($class, $new_value) = @_;
45 if (defined($new_value)) {
46 $additional_param_hash->{$class} = $new_value;
51 my $org = $additional_param_hash->{$class} || {};
52 foreach my $p (keys %$org) { $copy->{$p} = $org->{$p}; }
56 sub register_get_ipset
{
59 my $properties = $class->additional_parameters();
61 $properties->{name
} = $api_properties->{name
};
63 $class->register_method({
67 description
=> "List IPSet content",
69 additionalProperties
=> 0,
70 properties
=> $properties,
88 digest
=> get_standard_option
('pve-config-digest', { optional
=> 0} ),
91 links
=> [ { rel
=> 'child', href
=> "{cidr}" } ],
96 my ($fw_conf, $ipset) = $class->load_config($param);
98 return PVE
::Firewall
::copy_list_with_digest
($ipset);
102 sub register_create_ip
{
105 my $properties = $class->additional_parameters();
107 $properties->{name
} = $api_properties->{name
};
108 $properties->{cidr
} = $api_properties->{cidr
};
109 $properties->{nomatch
} = $api_properties->{nomatch
};
110 $properties->{comment
} = $api_properties->{comment
};
112 $class->register_method({
116 description
=> "Add IP or Network to IPSet.",
119 additionalProperties
=> 0,
120 properties
=> $properties,
122 returns
=> { type
=> "null" },
126 my ($fw_conf, $ipset) = $class->load_config($param);
128 my $cidr = $param->{cidr
};
130 foreach my $entry (@$ipset) {
131 raise_param_exc
({ cidr
=> "address '$cidr' already exists" })
132 if $entry->{cidr
} eq $cidr;
135 my $data = { cidr
=> $cidr };
136 $data->{nomatch
} = 1 if $param->{nomatch
};
137 $data->{comment
} = $param->{comment
} if $param->{comment
};
139 unshift @$ipset, $data;
141 $class->save_ipset($param, $fw_conf, $ipset);
147 sub register_read_ip
{
150 my $properties = $class->additional_parameters();
152 $properties->{name
} = $api_properties->{name
};
153 $properties->{cidr
} = $api_properties->{cidr
};
155 $class->register_method({
159 description
=> "Read IP or Network settings from IPSet.",
162 additionalProperties
=> 0,
163 properties
=> $properties,
165 returns
=> { type
=> "object" },
169 my ($fw_conf, $ipset) = $class->load_config($param);
171 my $list = PVE
::Firewall
::copy_list_with_digest
($ipset);
173 foreach my $entry (@$list) {
174 if ($entry->{cidr
} eq $param->{cidr
}) {
179 raise_param_exc
({ cidr
=> "no such IP/Network" });
183 sub register_update_ip
{
186 my $properties = $class->additional_parameters();
188 $properties->{name
} = $api_properties->{name
};
189 $properties->{cidr
} = $api_properties->{cidr
};
190 $properties->{nomatch
} = $api_properties->{nomatch
};
191 $properties->{comment
} = $api_properties->{comment
};
192 $properties->{digest
} = get_standard_option
('pve-config-digest');
194 $class->register_method({
198 description
=> "Update IP or Network settings",
201 additionalProperties
=> 0,
202 properties
=> $properties,
204 returns
=> { type
=> "null" },
208 my ($fw_conf, $ipset) = $class->load_config($param);
210 my (undef, $digest) = PVE
::Firewall
::copy_list_with_digest
($ipset);
211 PVE
::Tools
::assert_if_modified
($digest, $param->{digest
});
213 foreach my $entry (@$ipset) {
214 if($entry->{cidr
} eq $param->{cidr
}) {
215 $entry->{nomatch
} = $param->{nomatch
};
216 $entry->{comment
} = $param->{comment
};
217 $class->save_ipset($param, $fw_conf, $ipset);
222 raise_param_exc
({ cidr
=> "no such IP/Network" });
226 sub register_delete_ip
{
229 my $properties = $class->additional_parameters();
231 $properties->{name
} = $api_properties->{name
};
232 $properties->{cidr
} = $api_properties->{cidr
};
233 $properties->{digest
} = get_standard_option
('pve-config-digest');
235 $class->register_method({
239 description
=> "Remove IP or Network from IPSet.",
242 additionalProperties
=> 0,
243 properties
=> $properties,
245 returns
=> { type
=> "null" },
249 my ($fw_conf, $ipset) = $class->load_config($param);
251 my (undef, $digest) = PVE
::Firewall
::copy_list_with_digest
($ipset);
252 PVE
::Tools
::assert_if_modified
($digest, $param->{digest
});
256 foreach my $entry (@$ipset) {
257 push @$new, $entry if $entry->{cidr
} ne $param->{cidr
};
260 $class->save_ipset($param, $fw_conf, $new);
266 sub register_handlers
{
269 $class->register_get_ipset();
270 $class->register_create_ip();
271 $class->register_read_ip();
272 $class->register_update_ip();
273 $class->register_delete_ip();
276 package PVE
::API2
::Firewall
::ClusterIPset
;
281 use base
qw(PVE::API2::Firewall::IPSetBase);
284 my ($class, $param) = @_;
286 my $fw_conf = PVE
::Firewall
::load_clusterfw_conf
();
287 my $ipset = $fw_conf->{ipset
}->{$param->{name
}};
288 die "no such IPSet '$param->{name}'\n" if !defined($ipset);
290 return ($fw_conf, $ipset);
294 my ($class, $param, $fw_conf, $ipset) = @_;
296 $fw_conf->{ipset
}->{$param->{name
}} = $ipset;
297 PVE
::Firewall
::save_clusterfw_conf
($fw_conf);
300 __PACKAGE__-
>register_handlers();
302 package PVE
::API2
::Firewall
::BaseIPSetList
;
306 use PVE
::JSONSchema
qw(get_standard_option);
307 use PVE
::Exception
qw(raise_param_exc);
310 use base
qw(PVE::RESTHandler);
312 my $get_ipset_list = sub {
316 foreach my $name (keys %{$fw_conf->{ipset
}}) {
320 if (my $comment = $fw_conf->{ipset_comments
}->{$name}) {
321 $data->{comment
} = $comment;
326 my ($list, $digest) = PVE
::Firewall
::copy_list_with_digest
($res);
328 return wantarray ?
($list, $digest) : $list;
334 $class->register_method({
335 name
=> 'ipset_index',
338 description
=> "List IPSets",
340 additionalProperties
=> 0,
347 name
=> get_standard_option
('ipset-name'),
348 digest
=> get_standard_option
('pve-config-digest', { optional
=> 0} ),
355 links
=> [ { rel
=> 'child', href
=> "{name}" } ],
360 my $fw_conf = $class->load_config();
362 return &$get_ipset_list($fw_conf);
366 sub register_create
{
369 $class->register_method({
370 name
=> 'create_ipset',
373 description
=> "Create new IPSet",
376 additionalProperties
=> 0,
378 name
=> get_standard_option
('ipset-name'),
383 rename => get_standard_option
('ipset-name', {
384 description
=> "Rename an existing IPSet. You can set 'rename' to the same value as 'name' to update the 'comment' of an existing IPSet.",
387 digest
=> get_standard_option
('pve-config-digest'),
390 returns
=> { type
=> 'null' },
394 my $fw_conf = $class->load_config();
396 if ($param->{rename}) {
397 my (undef, $digest) = &$get_ipset_list($fw_conf);
398 PVE
::Tools
::assert_if_modified
($digest, $param->{digest
});
400 raise_param_exc
({ name
=> "IPSet '$param->{rename}' does not exists" })
401 if !$fw_conf->{ipset
}->{$param->{rename}};
403 my $data = delete $fw_conf->{ipset
}->{$param->{rename}};
404 $fw_conf->{ipset
}->{$param->{name
}} = $data;
405 if (my $comment = delete $fw_conf->{ipset_comments
}->{$param->{rename}}) {
406 $fw_conf->{ipset_comments
}->{$param->{name
}} = $comment;
408 $fw_conf->{ipset_comments
}->{$param->{name
}} = $param->{comment
} if defined($param->{comment
});
410 foreach my $name (keys %{$fw_conf->{ipset
}}) {
411 raise_param_exc
({ name
=> "IPSet '$name' already exists" })
412 if $name eq $param->{name
};
415 $fw_conf->{ipset
}->{$param->{name
}} = [];
416 $fw_conf->{ipset_comments
}->{$param->{name
}} = $param->{comment
} if defined($param->{comment
});
419 $class->save_config($fw_conf);
425 sub register_delete
{
428 $class->register_method({
429 name
=> 'delete_ipset',
432 description
=> "Delete IPSet",
435 additionalProperties
=> 0,
437 name
=> get_standard_option
('ipset-name'),
438 digest
=> get_standard_option
('pve-config-digest'),
441 returns
=> { type
=> 'null' },
445 my $fw_conf = $class->load_config();
447 return undef if !$fw_conf->{ipset
}->{$param->{name
}};
449 my (undef, $digest) = &$get_ipset_list($fw_conf);
450 PVE
::Tools
::assert_if_modified
($digest, $param->{digest
});
452 die "IPSet '$param->{name}' is not empty\n"
453 if scalar(@{$fw_conf->{ipset
}->{$param->{name
}}});
455 delete $fw_conf->{ipset
}->{$param->{name
}};
457 $class->save_config($fw_conf);
463 sub register_handlers
{
466 $class->register_index();
467 $class->register_create();
468 $class->register_delete();
471 package PVE
::API2
::Firewall
::ClusterIPSetList
;
477 use base
qw(PVE::API2::Firewall::BaseIPSetList);
482 return PVE
::Firewall
::load_clusterfw_conf
();
486 my ($class, $fw_conf) = @_;
488 PVE
::Firewall
::save_clusterfw_conf
($fw_conf);
491 __PACKAGE__-
>register_handlers();
493 __PACKAGE__-
>register_method ({
494 subclass
=> "PVE::API2::Firewall::ClusterIPset",
496 # set fragment delimiter (no subdirs) - we need that, because CIDR address contain a slash '/'
497 fragmentDelimiter
=> '',