]>
git.proxmox.com Git - pve-firewall.git/blob - src/PVE/API2/Firewall/VM.pm
1 package PVE
::API2
::Firewall
::VMBase
;
5 use PVE
::JSONSchema
qw(get_standard_option);
8 use PVE
::API2
::Firewall
::Rules
;
9 use PVE
::API2
::Firewall
::Aliases
;
11 use Data
::Dumper
; # fixme: remove
13 use base
qw(PVE::RESTHandler);
15 my $option_properties = {
17 description
=> "Enable host firewall rules.",
22 description
=> "Enable/disable MAC address filter.",
27 description
=> "Enable DHCP.",
32 description
=> "Input policy.",
35 enum
=> ['ACCEPT', 'REJECT', 'DROP'],
38 description
=> "Output policy.",
41 enum
=> ['ACCEPT', 'REJECT', 'DROP'],
43 log_level_in
=> get_standard_option
('pve-fw-loglevel', {
44 description
=> "Log level for incoming traffic." }),
45 log_level_out
=> get_standard_option
('pve-fw-loglevel', {
46 description
=> "Log level for outgoing traffic." }),
50 my $add_option_properties = sub {
51 my ($properties) = @_;
53 foreach my $k (keys %$option_properties) {
54 $properties->{$k} = $option_properties->{$k};
60 sub register_handlers
{
61 my ($class, $rule_env) = @_;
63 $class->register_method({
67 permissions
=> { user
=> 'all' },
68 description
=> "Directory index.",
70 additionalProperties
=> 0,
72 node
=> get_standard_option
('pve-node'),
73 vmid
=> get_standard_option
('pve-vmid'),
82 links
=> [ { rel
=> 'child', href
=> "{name}" } ],
89 { name
=> 'aliases' },
90 { name
=> 'options' },
97 $class->register_method({
98 name
=> 'get_options',
101 description
=> "Get VM firewall options.",
104 additionalProperties
=> 0,
106 node
=> get_standard_option
('pve-node'),
107 vmid
=> get_standard_option
('pve-vmid'),
112 #additionalProperties => 1,
113 properties
=> $option_properties,
118 my $vmfw_conf = PVE
::Firewall
::load_vmfw_conf
($rule_env, $param->{vmid
});
120 return PVE
::Firewall
::copy_opject_with_digest
($vmfw_conf->{options
});
123 $class->register_method({
124 name
=> 'set_options',
127 description
=> "Set Firewall options.",
131 additionalProperties
=> 0,
132 properties
=> &$add_option_properties({
133 node
=> get_standard_option
('pve-node'),
134 vmid
=> get_standard_option
('pve-vmid'),
136 type
=> 'string', format
=> 'pve-configid-list',
137 description
=> "A list of settings you want to delete.",
140 digest
=> get_standard_option
('pve-config-digest'),
143 returns
=> { type
=> "null" },
147 my $vmfw_conf = PVE
::Firewall
::load_vmfw_conf
($rule_env, $param->{vmid
});
149 my (undef, $digest) = PVE
::Firewall
::copy_opject_with_digest
($vmfw_conf->{options
});
150 PVE
::Tools
::assert_if_modified
($digest, $param->{digest
});
152 if ($param->{delete}) {
153 foreach my $opt (PVE
::Tools
::split_list
($param->{delete})) {
154 raise_param_exc
({ delete => "no such option '$opt'" })
155 if !$option_properties->{$opt};
156 delete $vmfw_conf->{options
}->{$opt};
160 if (defined($param->{enable
})) {
161 $param->{enable
} = $param->{enable
} ?
1 : 0;
164 foreach my $k (keys %$option_properties) {
165 next if !defined($param->{$k});
166 $vmfw_conf->{options
}->{$k} = $param->{$k};
169 PVE
::Firewall
::save_vmfw_conf
($param->{vmid
}, $vmfw_conf);
174 $class->register_method({
178 description
=> "Read firewall log",
181 check
=> ['perm', '/vms/{vmid}', [ 'VM.Console' ]],
185 additionalProperties
=> 0,
187 node
=> get_standard_option
('pve-node'),
188 vmid
=> get_standard_option
('pve-vmid'),
207 description
=> "Line number",
211 description
=> "Line text",
220 my $rpcenv = PVE
::RPCEnvironment
::get
();
221 my $user = $rpcenv->get_user();
222 my $vmid = $param->{vmid
};
224 my ($count, $lines) = PVE
::Tools
::dump_logfile
("/var/log/pve-firewall.log",
225 $param->{start
}, $param->{limit
},
228 $rpcenv->set_result_attrib('total', $count);
234 package PVE
::API2
::Firewall
::VM
;
239 use base
qw(PVE::API2::Firewall::VMBase);
241 __PACKAGE__-
>register_method ({
242 subclass
=> "PVE::API2::Firewall::VMRules",
246 __PACKAGE__-
>register_method ({
247 subclass
=> "PVE::API2::Firewall::VMAliases",
251 __PACKAGE__-
>register_method ({
252 subclass
=> "PVE::API2::Firewall::VMIPSetList",
256 __PACKAGE__-
>register_handlers('vm');
258 package PVE
::API2
::Firewall
::CT
;
263 use base
qw(PVE::API2::Firewall::VMBase);
265 __PACKAGE__-
>register_method ({
266 subclass
=> "PVE::API2::Firewall::CTRules",
270 __PACKAGE__-
>register_method ({
271 subclass
=> "PVE::API2::Firewall::CTAliases",
275 __PACKAGE__-
>register_method ({
276 subclass
=> "PVE::API2::Firewall::CTIPSetList",
280 __PACKAGE__-
>register_handlers('vm');