# -*- coding: utf-8 -*- # # Copyright (C) 2015-2016 Red Hat, Inc. # # Authors: # Thomas Woerner <twoerner@redhat.com> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # """ipset backend""" __all__ = [ "FirewallIPSet" ] from firewall.core.logger import log from firewall.core.ipset import remove_default_create_options as rm_def_cr_opts from firewall.core.io.ipset import IPSet from firewall import errors from firewall.errors import FirewallError class FirewallIPSet(object): def __init__(self, fw): self._fw = fw self._ipsets = { } def __repr__(self): return '%s(%r)' % (self.__class__, self._ipsets) # ipsets def cleanup(self): self._ipsets.clear() def check_ipset(self, name): if name not in self.get_ipsets(): raise FirewallError(errors.INVALID_IPSET, name) def query_ipset(self, name): return name in self.get_ipsets() def get_ipsets(self): return sorted(self._ipsets.keys()) def has_ipsets(self): return len(self._ipsets) > 0 def get_ipset(self, name, applied=False): self.check_ipset(name) obj = self._ipsets[name] if applied: self.check_applied_obj(obj) return obj def _error2warning(self, f, name, *args): # transform errors into warnings try: f(name, *args) except FirewallError as error: msg = str(error) log.warning("%s: %s" % (name, msg)) def backends(self): backends = [] if self._fw.nftables_enabled: backends.append(self._fw.nftables_backend) if self._fw.ipset_enabled: backends.append(self._fw.ipset_backend) return backends def add_ipset(self, obj): if obj.type not in self._fw.ipset_supported_types: raise FirewallError(errors.INVALID_TYPE, "'%s' is not supported by ipset." % obj.type) self._ipsets[obj.name] = obj def remove_ipset(self, name, keep=False): obj = self._ipsets[name] if obj.applied and not keep: try: for backend in self.backends(): backend.set_destroy(name) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) else: log.debug1("Keeping ipset '%s' because of timeout option", name) del self._ipsets[name] def apply_ipsets(self): for name in self.get_ipsets(): obj = self._ipsets[name] obj.applied = False log.debug1("Applying ipset '%s'" % name) for backend in self.backends(): if backend.name == "ipset": active = backend.set_get_active_terse() if name in active and ("timeout" not in obj.options or \ obj.options["timeout"] == "0" or \ obj.type != active[name][0] or \ rm_def_cr_opts(obj.options) != \ active[name][1]): try: backend.set_destroy(name) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) if self._fw.individual_calls() \ or backend.name == "nftables": try: backend.set_create(obj.name, obj.type, obj.options) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) else: obj.applied = True if "timeout" in obj.options and \ obj.options["timeout"] != "0": # no entries visible for ipsets with timeout continue for entry in obj.entries: try: backend.set_add(obj.name, entry) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) else: try: backend.set_restore(obj.name, obj.type, obj.entries, obj.options, None) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) else: obj.applied = True # TYPE def get_type(self, name): return self.get_ipset(name, applied=True).type # DIMENSION def get_dimension(self, name): return len(self.get_ipset(name, applied=True).type.split(",")) def check_applied(self, name): obj = self.get_ipset(name) self.check_applied_obj(obj) def check_applied_obj(self, obj): if not obj.applied: raise FirewallError( errors.NOT_APPLIED, obj.name) # OPTIONS def get_family(self, name): obj = self.get_ipset(name, applied=True) if "family" in obj.options: if obj.options["family"] == "inet6": return "ipv6" return "ipv4" # ENTRIES def __entry_id(self, entry): return entry def __entry(self, enable, name, entry): pass def add_entry(self, name, entry): obj = self.get_ipset(name, applied=True) IPSet.check_entry(entry, obj.options, obj.type) if entry in obj.entries: raise FirewallError(errors.ALREADY_ENABLED, "'%s' already is in '%s'" % (entry, name)) try: for backend in self.backends(): backend.set_add(obj.name, entry) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) else: if "timeout" not in obj.options or obj.options["timeout"] == "0" \ and entry not in obj.entries: # no entries visible for ipsets with timeout obj.entries.append(entry) def remove_entry(self, name, entry): obj = self.get_ipset(name, applied=True) # no entry check for removal if entry not in obj.entries: raise FirewallError(errors.NOT_ENABLED, "'%s' not in '%s'" % (entry, name)) try: for backend in self.backends(): backend.set_delete(obj.name, entry) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) else: if "timeout" not in obj.options or obj.options["timeout"] == "0" \ and entry not in obj.entries: # no entries visible for ipsets with timeout obj.entries.remove(entry) def query_entry(self, name, entry): obj = self.get_ipset(name, applied=True) if "timeout" in obj.options and obj.options["timeout"] != "0": # no entries visible for ipsets with timeout raise FirewallError(errors.IPSET_WITH_TIMEOUT, name) return entry in obj.entries def get_entries(self, name): obj = self.get_ipset(name, applied=True) return obj.entries def set_entries(self, name, entries): obj = self.get_ipset(name, applied=True) for entry in entries: IPSet.check_entry(entry, obj.options, obj.type) if "timeout" not in obj.options or obj.options["timeout"] == "0": # no entries visible for ipsets with timeout obj.entries = entries try: for backend in self.backends(): backend.set_flush(obj.name) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) else: obj.applied = True try: for backend in self.backends(): if self._fw.individual_calls() \ or backend.name == "nftables": for entry in obj.entries: backend.set_add(obj.name, entry) else: backend.set_restore(obj.name, obj.type, obj.entries, obj.options, None) except Exception as msg: raise FirewallError(errors.COMMAND_FAILED, msg) else: obj.applied = True return
Name | Type | Size | Permission | Actions |
---|---|---|---|---|
io | Folder | 0755 |
|
|
.__init__.pyo.40009 | File | 145 B | 0644 |
|
.base.pyo.40009 | File | 1.29 KB | 0644 |
|
.ebtables.pyo.40009 | File | 9.04 KB | 0644 |
|
.fw.pyo.40009 | File | 30.67 KB | 0644 |
|
.fw_config.pyo.40009 | File | 30.69 KB | 0644 |
|
.fw_direct.pyo.40009 | File | 14.77 KB | 0644 |
|
.fw_helper.pyo.40009 | File | 2.57 KB | 0644 |
|
.fw_icmptype.pyo.40009 | File | 3 KB | 0644 |
|
.fw_ifcfg.pyo.40009 | File | 1.84 KB | 0644 |
|
.fw_ipset.pyo.40009 | File | 9.02 KB | 0644 |
|
.fw_nm.pyo.40009 | File | 5.93 KB | 0644 |
|
.fw_policies.pyo.40009 | File | 2.94 KB | 0644 |
|
.fw_service.pyo.40009 | File | 2.14 KB | 0644 |
|
.fw_test.pyo.40009 | File | 17.45 KB | 0644 |
|
.fw_transaction.pyo.40009 | File | 10.96 KB | 0644 |
|
.fw_zone.pyo.40009 | File | 57.31 KB | 0644 |
|
.helper.pyo.40009 | File | 222 B | 0644 |
|
.icmp.pyo.40009 | File | 2.89 KB | 0644 |
|
.ipXtables.pyo.40009 | File | 34.8 KB | 0644 |
|
.ipset.pyo.40009 | File | 9.15 KB | 0644 |
|
.logger.pyo.40009 | File | 27.43 KB | 0644 |
|
.modules.pyo.40009 | File | 3.56 KB | 0644 |
|
.nftables.pyo.40009 | File | 38.56 KB | 0644 |
|
.prog.pyo.40009 | File | 988 B | 0644 |
|
.rich.pyo.40009 | File | 23.73 KB | 0644 |
|
.watcher.pyo.40009 | File | 3.55 KB | 0644 |
|
__init__.py | File | 0 B | 0644 |
|
__init__.pyc | File | 145 B | 0644 |
|
__init__.pyo | File | 145 B | 0644 |
|
base.py | File | 1.94 KB | 0644 |
|
base.pyc | File | 1.29 KB | 0644 |
|
base.pyo | File | 1.29 KB | 0644 |
|
ebtables.py | File | 9.13 KB | 0644 |
|
ebtables.pyc | File | 9.04 KB | 0644 |
|
ebtables.pyo | File | 9.04 KB | 0644 |
|
fw.py | File | 43.71 KB | 0644 |
|
fw.pyc | File | 30.67 KB | 0644 |
|
fw.pyo | File | 30.67 KB | 0644 |
|
fw_config.py | File | 35.99 KB | 0644 |
|
fw_config.pyc | File | 30.69 KB | 0644 |
|
fw_config.pyo | File | 30.69 KB | 0644 |
|
fw_direct.py | File | 20.12 KB | 0644 |
|
fw_direct.pyc | File | 14.77 KB | 0644 |
|
fw_direct.pyo | File | 14.77 KB | 0644 |
|
fw_helper.py | File | 1.79 KB | 0644 |
|
fw_helper.pyc | File | 2.57 KB | 0644 |
|
fw_helper.pyo | File | 2.57 KB | 0644 |
|
fw_icmptype.py | File | 2.77 KB | 0644 |
|
fw_icmptype.pyc | File | 3 KB | 0644 |
|
fw_icmptype.pyo | File | 3 KB | 0644 |
|
fw_ifcfg.py | File | 2.5 KB | 0644 |
|
fw_ifcfg.pyc | File | 1.84 KB | 0644 |
|
fw_ifcfg.pyo | File | 1.84 KB | 0644 |
|
fw_ipset.py | File | 8.96 KB | 0644 |
|
fw_ipset.pyc | File | 9.02 KB | 0644 |
|
fw_ipset.pyo | File | 9.02 KB | 0644 |
|
fw_nm.py | File | 6.49 KB | 0644 |
|
fw_nm.pyc | File | 5.93 KB | 0644 |
|
fw_nm.pyo | File | 5.93 KB | 0644 |
|
fw_policies.py | File | 2.74 KB | 0644 |
|
fw_policies.pyc | File | 2.94 KB | 0644 |
|
fw_policies.pyo | File | 2.94 KB | 0644 |
|
fw_service.py | File | 1.6 KB | 0644 |
|
fw_service.pyc | File | 2.14 KB | 0644 |
|
fw_service.pyo | File | 2.14 KB | 0644 |
|
fw_test.py | File | 22.06 KB | 0644 |
|
fw_test.pyc | File | 17.45 KB | 0644 |
|
fw_test.pyo | File | 17.45 KB | 0644 |
|
fw_transaction.py | File | 10.54 KB | 0644 |
|
fw_transaction.pyc | File | 10.96 KB | 0644 |
|
fw_transaction.pyo | File | 10.96 KB | 0644 |
|
fw_zone.py | File | 75.6 KB | 0644 |
|
fw_zone.pyc | File | 57.31 KB | 0644 |
|
fw_zone.pyo | File | 57.31 KB | 0644 |
|
helper.py | File | 804 B | 0644 |
|
helper.pyc | File | 222 B | 0644 |
|
helper.pyo | File | 222 B | 0644 |
|
icmp.py | File | 3.03 KB | 0644 |
|
icmp.pyc | File | 2.89 KB | 0644 |
|
icmp.pyo | File | 2.89 KB | 0644 |
|
ipXtables.py | File | 47.68 KB | 0644 |
|
ipXtables.pyc | File | 34.8 KB | 0644 |
|
ipXtables.pyo | File | 34.8 KB | 0644 |
|
ipset.py | File | 9.1 KB | 0644 |
|
ipset.pyc | File | 9.15 KB | 0644 |
|
ipset.pyo | File | 9.15 KB | 0644 |
|
logger.py | File | 30.31 KB | 0644 |
|
logger.pyc | File | 27.43 KB | 0644 |
|
logger.pyo | File | 27.43 KB | 0644 |
|
modules.py | File | 3.63 KB | 0644 |
|
modules.pyc | File | 3.56 KB | 0644 |
|
modules.pyo | File | 3.56 KB | 0644 |
|
nftables.py | File | 60.55 KB | 0644 |
|
nftables.pyc | File | 38.56 KB | 0644 |
|
nftables.pyo | File | 38.56 KB | 0644 |
|
prog.py | File | 1.47 KB | 0644 |
|
prog.pyc | File | 988 B | 0644 |
|
prog.pyo | File | 988 B | 0644 |
|
rich.py | File | 29.34 KB | 0644 |
|
rich.pyc | File | 23.73 KB | 0644 |
|
rich.pyo | File | 23.73 KB | 0644 |
|
watcher.py | File | 3.15 KB | 0644 |
|
watcher.pyc | File | 3.55 KB | 0644 |
|
watcher.pyo | File | 3.55 KB | 0644 |
|