ec6e783d1ac9c6f127c8a09e811413c7c38f4924
1 package PVE
::API2
::Firewall
::IPSetBase
;
5 use PVE
::Exception
qw(raise raise_param_exc);
6 use PVE
::JSONSchema
qw(get_standard_option);
10 use base
qw(PVE::RESTHandler);
12 my $api_properties = {
14 description
=> "Network/IP specification in CIDR format.",
15 type
=> 'string', format
=> 'IPv4orCIDR',
18 description
=> "IP set name.",
32 my ($class, $param) = @_;
34 die "implement this in subclass";
36 #return ($fw_conf, $rules);
40 my ($class, $param, $fw_conf, $rules) = @_;
42 die "implement this in subclass";
45 my $additional_param_hash = {};
47 sub additional_parameters
{
48 my ($class, $new_value) = @_;
50 if (defined($new_value)) {
51 $additional_param_hash->{$class} = $new_value;
56 my $org = $additional_param_hash->{$class} || {};
57 foreach my $p (keys %$org) { $copy->{$p} = $org->{$p}; }
61 sub register_get_ipset
{
64 my $properties = $class->additional_parameters();
66 $properties->{name
} = $api_properties->{name
};
68 $class->register_method({
72 description
=> "List IPSet content",
74 additionalProperties
=> 0,
75 properties
=> $properties,
95 links
=> [ { rel
=> 'child', href
=> "{cidr}" } ],
100 my ($fw_conf, $ipset) = $class->load_config($param);
106 sub register_add_ip
{
109 my $properties = $class->additional_parameters();
111 $properties->{name
} = $api_properties->{name
};
112 $properties->{cidr
} = $api_properties->{cidr
};
113 $properties->{nomatch
} = $api_properties->{nomatch
};
114 $properties->{comment
} = $api_properties->{comment
};
116 $class->register_method({
120 description
=> "Add IP or Network to IPSet.",
123 additionalProperties
=> 0,
124 properties
=> $properties,
126 returns
=> { type
=> "null" },
130 my ($fw_conf, $ipset) = $class->load_config($param);
132 my $cidr = $param->{cidr
};
134 foreach my $entry (@$ipset) {
135 raise_param_exc
({ cidr
=> "address '$cidr' already exists" })
136 if $entry->{cidr
} eq $cidr;
139 my $data = { cidr
=> $cidr };
140 $data->{nomatch
} = 1 if $param->{nomatch
};
141 $data->{comment
} = $param->{comment
} if $param->{comment
};
143 unshift @$ipset, $data;
145 $class->save_ipset($param, $fw_conf, $ipset);
151 sub register_remove_ip
{
154 my $properties = $class->additional_parameters();
156 $properties->{name
} = $api_properties->{name
};
157 $properties->{cidr
} = $api_properties->{cidr
};
159 $class->register_method({
163 description
=> "Remove IP or Network from IPSet.",
166 additionalProperties
=> 0,
167 properties
=> $properties,
169 returns
=> { type
=> "null" },
173 my ($fw_conf, $ipset) = $class->load_config($param);
177 foreach my $entry (@$ipset) {
178 push @$new, $entry if $entry->{cidr
} ne $param->{cidr
};
181 $class->save_ipset($param, $fw_conf, $new);
187 sub register_handlers
{
190 $class->register_get_ipset();
191 $class->register_add_ip();
192 $class->register_remove_ip();
195 package PVE
::API2
::Firewall
::ClusterIPset
;
200 use base
qw(PVE::API2::Firewall::IPSetBase);
203 my ($class, $param) = @_;
205 my $fw_conf = PVE
::Firewall
::load_clusterfw_conf
();
206 my $ipset = $fw_conf->{ipset
}->{$param->{name
}};
207 die "no such IPSet '$param->{name}'\n" if !defined($ipset);
209 return ($fw_conf, $ipset);
213 my ($class, $param, $fw_conf, $ipset) = @_;
215 $fw_conf->{ipset
}->{$param->{name
}} = $ipset;
216 PVE
::Firewall
::save_clusterfw_conf
($fw_conf);
219 __PACKAGE__-
>register_handlers();