From: "Max Carrara" <m.carrara@proxmox.com>
To: "Proxmox VE development discussion" <pve-devel@lists.proxmox.com>
Subject: Re: [pve-devel] [PATCH proxmox-perl-rs 21/21] add PVE::RS::Firewall::SDN module
Date: Tue, 13 Aug 2024 18:14:45 +0200 [thread overview]
Message-ID: <D3EX1L38BR0Y.3RTSBJQO8U64M@proxmox.com> (raw)
In-Reply-To: <20240626121550.292290-22-s.hanreich@proxmox.com>
On Wed Jun 26, 2024 at 2:15 PM CEST, Stefan Hanreich wrote:
> Used for obtaining the IPSets that get autogenerated by the nftables
> firewall. The returned configuration has the same format as the
> pve-firewall uses internally, making it compatible with the existing
> pve-firewall code.
>
> Signed-off-by: Stefan Hanreich <s.hanreich@proxmox.com>
> ---
> pve-rs/Cargo.toml | 1 +
> pve-rs/Makefile | 1 +
> pve-rs/src/firewall/mod.rs | 1 +
> pve-rs/src/firewall/sdn.rs | 130 +++++++++++++++++++++++++++++++++++++
> pve-rs/src/lib.rs | 1 +
> 5 files changed, 134 insertions(+)
> create mode 100644 pve-rs/src/firewall/mod.rs
> create mode 100644 pve-rs/src/firewall/sdn.rs
>
> diff --git a/pve-rs/Cargo.toml b/pve-rs/Cargo.toml
> index e40588d..f612b3a 100644
> --- a/pve-rs/Cargo.toml
> +++ b/pve-rs/Cargo.toml
> @@ -43,3 +43,4 @@ proxmox-subscription = "0.4"
> proxmox-sys = "0.5"
> proxmox-tfa = { version = "4.0.4", features = ["api"] }
> proxmox-time = "2"
> +proxmox-ve-config = { version = "0.1.0" }
This hunk doesn't apply anymore because proxmox-sys was bumped.
Manually adding proxmox-ve-config as depencency works just fine though,
so this needs just a little rebase.
> diff --git a/pve-rs/Makefile b/pve-rs/Makefile
> index c6b4e08..d01da69 100644
> --- a/pve-rs/Makefile
> +++ b/pve-rs/Makefile
> @@ -28,6 +28,7 @@ PERLMOD_GENPACKAGE := /usr/lib/perlmod/genpackage.pl \
>
> PERLMOD_PACKAGES := \
> PVE::RS::APT::Repositories \
> + PVE::RS::Firewall::SDN \
> PVE::RS::OpenId \
> PVE::RS::ResourceScheduling::Static \
> PVE::RS::TFA
> diff --git a/pve-rs/src/firewall/mod.rs b/pve-rs/src/firewall/mod.rs
> new file mode 100644
> index 0000000..8bd18a8
> --- /dev/null
> +++ b/pve-rs/src/firewall/mod.rs
> @@ -0,0 +1 @@
> +pub mod sdn;
> diff --git a/pve-rs/src/firewall/sdn.rs b/pve-rs/src/firewall/sdn.rs
> new file mode 100644
> index 0000000..55f3e93
> --- /dev/null
> +++ b/pve-rs/src/firewall/sdn.rs
> @@ -0,0 +1,130 @@
> +#[perlmod::package(name = "PVE::RS::Firewall::SDN", lib = "pve_rs")]
> +mod export {
> + use std::collections::HashMap;
> + use std::{fs, io};
> +
> + use anyhow::{bail, Context, Error};
> + use serde::Serialize;
> +
> + use proxmox_ve_config::{
> + common::Allowlist,
> + firewall::types::ipset::{IpsetAddress, IpsetEntry},
> + firewall::types::Ipset,
> + guest::types::Vmid,
> + sdn::{
> + config::{RunningConfig, SdnConfig},
> + ipam::{Ipam, IpamJson},
> + SdnNameError, VnetName,
SdnNameError isn't used here.
> + },
> + };
> +
> + #[derive(Clone, Debug, Default, Serialize)]
> + pub struct LegacyIpsetEntry {
> + nomatch: bool,
> + cidr: String,
> + comment: Option<String>,
> + }
> +
> + impl LegacyIpsetEntry {
> + pub fn from_ipset_entry(entry: &IpsetEntry) -> Vec<LegacyIpsetEntry> {
> + let mut entries = Vec::new();
> +
> + match &entry.address {
> + IpsetAddress::Alias(name) => {
> + entries.push(Self {
> + nomatch: entry.nomatch,
> + cidr: name.to_string(),
> + comment: entry.comment.clone(),
> + });
> + }
> + IpsetAddress::Cidr(cidr) => {
> + entries.push(Self {
> + nomatch: entry.nomatch,
> + cidr: cidr.to_string(),
> + comment: entry.comment.clone(),
> + });
> + }
> + IpsetAddress::Range(range) => {
> + entries.extend(range.to_cidrs().into_iter().map(|cidr| Self {
> + nomatch: entry.nomatch,
> + cidr: cidr.to_string(),
> + comment: entry.comment.clone(),
> + }))
> + }
> + };
> +
> + entries
> + }
> + }
> +
> + #[derive(Clone, Debug, Default, Serialize)]
> + pub struct SdnFirewallConfig {
> + ipset: HashMap<String, Vec<LegacyIpsetEntry>>,
> + ipset_comments: HashMap<String, String>,
> + }
> +
> + impl SdnFirewallConfig {
> + pub fn new() -> Self {
> + Default::default()
> + }
> +
> + pub fn extend_ipsets(&mut self, ipsets: impl IntoIterator<Item = Ipset>) {
> + for ipset in ipsets {
> + let entries = ipset
> + .iter()
> + .flat_map(LegacyIpsetEntry::from_ipset_entry)
> + .collect();
> +
> + self.ipset.insert(ipset.name().name().to_string(), entries);
> +
> + if let Some(comment) = &ipset.comment {
> + self.ipset_comments
> + .insert(ipset.name().name().to_string(), comment.to_string());
> + }
> + }
> + }
> + }
> +
> + const SDN_RUNNING_CONFIG: &str = "/etc/pve/sdn/.running-config";
> + const SDN_IPAM: &str = "/etc/pve/priv/ipam.db";
> +
> + #[export]
> + pub fn config(
> + vnet_filter: Option<Vec<VnetName>>,
> + vm_filter: Option<Vec<Vmid>>,
> + ) -> Result<SdnFirewallConfig, Error> {
> + let mut refs = SdnFirewallConfig::new();
> +
> + match fs::read_to_string(SDN_RUNNING_CONFIG) {
> + Ok(data) => {
> + let running_config: RunningConfig = serde_json::from_str(&data)?;
> + let sdn_config = SdnConfig::try_from(running_config)
> + .with_context(|| "Failed to parse SDN config".to_string())?;
> +
> + let allowlist = vnet_filter.map(Allowlist::from_iter);
> + refs.extend_ipsets(sdn_config.ipsets(allowlist.as_ref()));
> + }
> + Err(e) if e.kind() == io::ErrorKind::NotFound => (),
> + Err(e) => {
> + bail!("Cannot open SDN running config: {e:#}");
> + }
> + };
> +
> + match fs::read_to_string(SDN_IPAM) {
> + Ok(data) => {
> + let ipam_json: IpamJson = serde_json::from_str(&data)?;
> + let ipam: Ipam = Ipam::try_from(ipam_json)
> + .with_context(|| "Failed to parse IPAM".to_string())?;
> +
> + let allowlist = vm_filter.map(Allowlist::from_iter);
> + refs.extend_ipsets(ipam.ipsets(allowlist.as_ref()));
> + }
> + Err(e) if e.kind() == io::ErrorKind::NotFound => (),
> + Err(e) => {
> + bail!("Cannot open IPAM database: {e:#}");
> + }
> + };
> +
> + Ok(refs)
> + }
> +}
> diff --git a/pve-rs/src/lib.rs b/pve-rs/src/lib.rs
> index 42be39e..dae190e 100644
> --- a/pve-rs/src/lib.rs
> +++ b/pve-rs/src/lib.rs
> @@ -4,6 +4,7 @@
> pub mod common;
>
> pub mod apt;
> +pub mod firewall;
> pub mod openid;
> pub mod resource_scheduling;
> pub mod tfa;
_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel
next prev parent reply other threads:[~2024-08-13 16:15 UTC|newest]
Thread overview: 43+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-06-26 12:15 [pve-devel] [RFC firewall/proxmox{-ve-rs, -firewall, -perl-rs} 00/21] autogenerate ipsets for sdn objects Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 01/21] debian: add files for packaging Stefan Hanreich
2024-06-27 10:41 ` Gabriel Goller
2024-07-16 16:03 ` Thomas Lamprecht
2024-08-13 16:06 ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 02/21] firewall: add ip range types Stefan Hanreich
2024-08-13 16:08 ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 03/21] firewall: address: use new iprange type for ip entries Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 04/21] ipset: add range variant to addresses Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 05/21] iprange: add methods for converting an ip range to cidrs Stefan Hanreich
2024-08-13 16:09 ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 06/21] ipset: address: add helper methods Stefan Hanreich
2024-06-27 10:45 ` Gabriel Goller
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 07/21] firewall: guest: derive traits according to rust api guidelines Stefan Hanreich
2024-06-27 10:50 ` Gabriel Goller
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 08/21] common: add allowlist Stefan Hanreich
2024-06-27 10:47 ` Gabriel Goller
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 09/21] sdn: add name types Stefan Hanreich
2024-06-27 10:56 ` Gabriel Goller
2024-07-16 9:27 ` Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 10/21] sdn: add ipam module Stefan Hanreich
2024-08-13 16:12 ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 11/21] sdn: ipam: add method for generating ipsets Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 12/21] sdn: add config module Stefan Hanreich
2024-06-27 10:54 ` Gabriel Goller
2024-07-16 9:28 ` Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 13/21] sdn: config: add method for generating ipsets Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 14/21] tests: add sdn config tests Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 15/21] tests: add ipam tests Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-firewall 16/21] cargo: update dependencies Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-firewall 17/21] config: tests: add support for loading sdn and ipam config Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-firewall 18/21] ipsets: autogenerate ipsets for vnets and ipam Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH pve-firewall 19/21] add support for loading sdn firewall configuration Stefan Hanreich
2024-08-13 16:14 ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH pve-firewall 20/21] api: load sdn ipsets Stefan Hanreich
2024-06-26 12:34 ` Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-perl-rs 21/21] add PVE::RS::Firewall::SDN module Stefan Hanreich
2024-08-13 16:14 ` Max Carrara [this message]
2024-06-28 13:46 ` [pve-devel] [RFC firewall/proxmox{-ve-rs, -firewall, -perl-rs} 00/21] autogenerate ipsets for sdn objects Gabriel Goller
2024-07-16 9:33 ` Stefan Hanreich
2024-08-13 16:06 ` Max Carrara
2024-09-24 8:41 ` Thomas Lamprecht
2024-10-10 15:59 ` Stefan Hanreich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=D3EX1L38BR0Y.3RTSBJQO8U64M@proxmox.com \
--to=m.carrara@proxmox.com \
--cc=pve-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.