Your IP : 18.217.89.130
# -*- coding: utf-8 -*-
#
# Copyright (C) 2015-2016 Red Hat, Inc.
#
# Authors:
# Thomas Woerner <twoerner@redhat.com>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# force use of pygobject3 in python-slip
from gi.repository import GObject
import sys
sys.modules['gobject'] = GObject
import dbus
import dbus.service
import slip.dbus
import slip.dbus.service
from firewall import config
from firewall.dbus_utils import dbus_to_python, \
dbus_introspection_prepare_properties, \
dbus_introspection_add_properties
from firewall.core.io.ipset import IPSet
from firewall.core.ipset import IPSET_TYPES, normalize_ipset_entry, \
check_entry_overlaps_existing, \
check_for_overlapping_entries
from firewall.core.logger import log
from firewall.server.decorators import handle_exceptions, \
dbus_handle_exceptions, dbus_service_method
from firewall import errors
from firewall.errors import FirewallError
############################################################################
#
# class FirewallDConfigIPSet
#
############################################################################
class FirewallDConfigIPSet(slip.dbus.service.Object):
"""FirewallD main class"""
persistent = True
""" Make FirewallD persistent. """
default_polkit_auth_required = config.dbus.PK_ACTION_CONFIG
""" Use PK_ACTION_INFO as a default """
@handle_exceptions
def __init__(self, parent, conf, ipset, item_id, *args, **kwargs):
super(FirewallDConfigIPSet, self).__init__(*args, **kwargs)
self.parent = parent
self.config = conf
self.obj = ipset
self.item_id = item_id
self.busname = args[0]
self.path = args[1]
self._log_prefix = "config.ipset.%d" % self.item_id
dbus_introspection_prepare_properties(
self, config.dbus.DBUS_INTERFACE_CONFIG_IPSET)
@dbus_handle_exceptions
def __del__(self):
pass
@dbus_handle_exceptions
def unregister(self):
self.remove_from_connection()
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
# P R O P E R T I E S
@dbus_handle_exceptions
def _get_property(self, property_name):
if property_name == "name":
return dbus.String(self.obj.name)
elif property_name == "filename":
return dbus.String(self.obj.filename)
elif property_name == "path":
return dbus.String(self.obj.path)
elif property_name == "default":
return dbus.Boolean(self.obj.default)
elif property_name == "builtin":
return dbus.Boolean(self.obj.builtin)
else:
raise dbus.exceptions.DBusException(
"org.freedesktop.DBus.Error.InvalidArgs: "
"Property '%s' does not exist" % property_name)
@dbus_service_method(dbus.PROPERTIES_IFACE, in_signature='ss',
out_signature='v')
@dbus_handle_exceptions
def Get(self, interface_name, property_name, sender=None): # pylint: disable=W0613
# get a property
interface_name = dbus_to_python(interface_name, str)
property_name = dbus_to_python(property_name, str)
log.debug1("%s.Get('%s', '%s')", self._log_prefix,
interface_name, property_name)
if interface_name != config.dbus.DBUS_INTERFACE_CONFIG_IPSET:
raise dbus.exceptions.DBusException(
"org.freedesktop.DBus.Error.UnknownInterface: "
"Interface '%s' does not exist" % interface_name)
return self._get_property(property_name)
@dbus_service_method(dbus.PROPERTIES_IFACE, in_signature='s',
out_signature='a{sv}')
@dbus_handle_exceptions
def GetAll(self, interface_name, sender=None): # pylint: disable=W0613
interface_name = dbus_to_python(interface_name, str)
log.debug1("%s.GetAll('%s')", self._log_prefix, interface_name)
if interface_name != config.dbus.DBUS_INTERFACE_CONFIG_IPSET:
raise dbus.exceptions.DBusException(
"org.freedesktop.DBus.Error.UnknownInterface: "
"Interface '%s' does not exist" % interface_name)
ret = { }
for x in [ "name", "filename", "path", "default", "builtin" ]:
ret[x] = self._get_property(x)
return dbus.Dictionary(ret, signature="sv")
@slip.dbus.polkit.require_auth(config.dbus.PK_ACTION_CONFIG)
@dbus_service_method(dbus.PROPERTIES_IFACE, in_signature='ssv')
@dbus_handle_exceptions
def Set(self, interface_name, property_name, new_value, sender=None):
interface_name = dbus_to_python(interface_name, str)
property_name = dbus_to_python(property_name, str)
new_value = dbus_to_python(new_value)
log.debug1("%s.Set('%s', '%s', '%s')", self._log_prefix,
interface_name, property_name, new_value)
self.parent.accessCheck(sender)
if interface_name != config.dbus.DBUS_INTERFACE_CONFIG_IPSET:
raise dbus.exceptions.DBusException(
"org.freedesktop.DBus.Error.UnknownInterface: "
"Interface '%s' does not exist" % interface_name)
raise dbus.exceptions.DBusException(
"org.freedesktop.DBus.Error.PropertyReadOnly: "
"Property '%s' is read-only" % property_name)
@dbus.service.signal(dbus.PROPERTIES_IFACE, signature='sa{sv}as')
def PropertiesChanged(self, interface_name, changed_properties,
invalidated_properties):
interface_name = dbus_to_python(interface_name, str)
changed_properties = dbus_to_python(changed_properties)
invalidated_properties = dbus_to_python(invalidated_properties)
log.debug1("%s.PropertiesChanged('%s', '%s', '%s')", self._log_prefix,
interface_name, changed_properties, invalidated_properties)
@slip.dbus.polkit.require_auth(config.dbus.PK_ACTION_INFO)
@dbus_service_method(dbus.INTROSPECTABLE_IFACE, out_signature='s')
@dbus_handle_exceptions
def Introspect(self, sender=None): # pylint: disable=W0613
log.debug2("%s.Introspect()", self._log_prefix)
data = super(FirewallDConfigIPSet, self).Introspect(
self.path, self.busname.get_bus())
return dbus_introspection_add_properties(
self, data, config.dbus.DBUS_INTERFACE_CONFIG_IPSET)
# S E T T I N G S
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
out_signature=IPSet.DBUS_SIGNATURE)
@dbus_handle_exceptions
def getSettings(self, sender=None): # pylint: disable=W0613
"""get settings for ipset
"""
log.debug1("%s.getSettings()", self._log_prefix)
return self.config.get_ipset_config(self.obj)
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature=IPSet.DBUS_SIGNATURE)
@dbus_handle_exceptions
def update(self, settings, sender=None):
"""update settings for ipset
"""
settings = dbus_to_python(settings)
log.debug1("%s.update('...')", self._log_prefix)
self.parent.accessCheck(sender)
self.obj = self.config.set_ipset_config(self.obj, settings)
self.Updated(self.obj.name)
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET)
@dbus_handle_exceptions
def loadDefaults(self, sender=None):
"""load default settings for builtin ipset
"""
log.debug1("%s.loadDefaults()", self._log_prefix)
self.parent.accessCheck(sender)
self.obj = self.config.load_ipset_defaults(self.obj)
self.Updated(self.obj.name)
#self.PropertiesChanged(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
# { "default": True }, [ ])
@dbus.service.signal(config.dbus.DBUS_INTERFACE_CONFIG_IPSET, signature='s')
@dbus_handle_exceptions
def Updated(self, name):
log.debug1("%s.Updated('%s')" % (self._log_prefix, name))
# R E M O V E
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET)
@dbus_handle_exceptions
def remove(self, sender=None):
"""remove ipset
"""
log.debug1("%s.remove()", self._log_prefix)
self.parent.accessCheck(sender)
self.config.remove_ipset(self.obj)
self.parent.removeIPSet(self.obj)
@dbus.service.signal(config.dbus.DBUS_INTERFACE_CONFIG_IPSET, signature='s')
@dbus_handle_exceptions
def Removed(self, name):
log.debug1("%s.Removed('%s')" % (self._log_prefix, name))
# R E N A M E
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s')
@dbus_handle_exceptions
def rename(self, name, sender=None):
"""rename ipset
"""
name = dbus_to_python(name, str)
log.debug1("%s.rename('%s')", self._log_prefix, name)
self.parent.accessCheck(sender)
self.obj = self.config.rename_ipset(self.obj, name)
self.Renamed(name)
#self.PropertiesChanged(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
# { "name": name }, [ ])
@dbus.service.signal(config.dbus.DBUS_INTERFACE_CONFIG_IPSET, signature='s')
@dbus_handle_exceptions
def Renamed(self, name):
log.debug1("%s.Renamed('%s')" % (self._log_prefix, name))
# version
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
out_signature='s')
@dbus_handle_exceptions
def getVersion(self, sender=None): # pylint: disable=W0613
log.debug1("%s.getVersion()", self._log_prefix)
return self.getSettings()[0]
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s')
@dbus_handle_exceptions
def setVersion(self, version, sender=None):
version = dbus_to_python(version, str)
log.debug1("%s.setVersion('%s')", self._log_prefix, version)
self.parent.accessCheck(sender)
settings = list(self.getSettings())
settings[0] = version
self.update(settings)
# short
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
out_signature='s')
@dbus_handle_exceptions
def getShort(self, sender=None): # pylint: disable=W0613
log.debug1("%s.getShort()", self._log_prefix)
return self.getSettings()[1]
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s')
@dbus_handle_exceptions
def setShort(self, short, sender=None):
short = dbus_to_python(short, str)
log.debug1("%s.setShort('%s')", self._log_prefix, short)
self.parent.accessCheck(sender)
settings = list(self.getSettings())
settings[1] = short
self.update(settings)
# description
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
out_signature='s')
@dbus_handle_exceptions
def getDescription(self, sender=None): # pylint: disable=W0613
log.debug1("%s.getDescription()", self._log_prefix)
return self.getSettings()[2]
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s')
@dbus_handle_exceptions
def setDescription(self, description, sender=None):
description = dbus_to_python(description, str)
log.debug1("%s.setDescription('%s')", self._log_prefix,
description)
self.parent.accessCheck(sender)
settings = list(self.getSettings())
settings[2] = description
self.update(settings)
# type
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
out_signature='s')
@dbus_handle_exceptions
def getType(self, sender=None): # pylint: disable=W0613
log.debug1("%s.getType()", self._log_prefix)
return self.getSettings()[3]
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s')
@dbus_handle_exceptions
def setType(self, ipset_type, sender=None):
ipset_type = dbus_to_python(ipset_type, str)
log.debug1("%s.setType('%s')", self._log_prefix, ipset_type)
self.parent.accessCheck(sender)
if ipset_type not in IPSET_TYPES:
raise FirewallError(errors.INVALID_TYPE, ipset_type)
settings = list(self.getSettings())
settings[3] = ipset_type
self.update(settings)
# options
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
out_signature='a{ss}')
@dbus_handle_exceptions
def getOptions(self, sender=None): # pylint: disable=W0613
log.debug1("%s.getOptions()", self._log_prefix)
return self.getSettings()[4]
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='a{ss}')
@dbus_handle_exceptions
def setOptions(self, options, sender=None):
options = dbus_to_python(options, dict)
log.debug1("%s.setOptions('[%s]')", self._log_prefix,
repr(options))
self.parent.accessCheck(sender)
settings = list(self.getSettings())
settings[4] = options
self.update(settings)
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='ss')
@dbus_handle_exceptions
def addOption(self, key, value, sender=None):
key = dbus_to_python(key, str)
value = dbus_to_python(value, str)
log.debug1("%s.addOption('%s', '%s')", self._log_prefix, key, value)
self.parent.accessCheck(sender)
settings = list(self.getSettings())
if key in settings[4] and settings[4][key] == value:
raise FirewallError(errors.ALREADY_ENABLED,
"'%s': '%s'" % (key, value))
settings[4][key] = value
self.update(settings)
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s')
@dbus_handle_exceptions
def removeOption(self, key, sender=None):
key = dbus_to_python(key, str)
log.debug1("%s.removeOption('%s')", self._log_prefix, key)
self.parent.accessCheck(sender)
settings = list(self.getSettings())
if key not in settings[4]:
raise FirewallError(errors.NOT_ENABLED, key)
del settings[4][key]
self.update(settings)
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='ss',
out_signature='b')
@dbus_handle_exceptions
def queryOption(self, key, value, sender=None): # pylint: disable=W0613
key = dbus_to_python(key, str)
value = dbus_to_python(value, str)
log.debug1("%s.queryOption('%s', '%s')", self._log_prefix, key,
value)
settings = list(self.getSettings())
return (key in settings[4] and settings[4][key] == value)
# entries
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
out_signature='as')
@dbus_handle_exceptions
def getEntries(self, sender=None): # pylint: disable=W0613
log.debug1("%s.getEntries()", self._log_prefix)
return self.getSettings()[5]
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='as')
@dbus_handle_exceptions
def setEntries(self, entries, sender=None):
entries = dbus_to_python(entries, list)
check_for_overlapping_entries(entries)
log.debug1("%s.setEntries('[%s]')", self._log_prefix,
",".join(entries))
self.parent.accessCheck(sender)
settings = list(self.getSettings())
if "timeout" in settings[4] and settings[4]["timeout"] != "0":
raise FirewallError(errors.IPSET_WITH_TIMEOUT)
settings[5] = entries
self.update(settings)
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s')
@dbus_handle_exceptions
def addEntry(self, entry, sender=None):
entry = dbus_to_python(entry, str)
entry = normalize_ipset_entry(entry)
log.debug1("%s.addEntry('%s')", self._log_prefix, entry)
self.parent.accessCheck(sender)
settings = list(self.getSettings())
if "timeout" in settings[4] and settings[4]["timeout"] != "0":
raise FirewallError(errors.IPSET_WITH_TIMEOUT)
if entry in settings[5]:
raise FirewallError(errors.ALREADY_ENABLED, entry)
check_entry_overlaps_existing(entry, settings[5])
settings[5].append(entry)
self.update(settings)
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s')
@dbus_handle_exceptions
def removeEntry(self, entry, sender=None):
entry = dbus_to_python(entry, str)
entry = normalize_ipset_entry(entry)
log.debug1("%s.removeEntry('%s')", self._log_prefix, entry)
self.parent.accessCheck(sender)
settings = list(self.getSettings())
if "timeout" in settings[4] and settings[4]["timeout"] != "0":
raise FirewallError(errors.IPSET_WITH_TIMEOUT)
if entry not in settings[5]:
raise FirewallError(errors.NOT_ENABLED, entry)
settings[5].remove(entry)
self.update(settings)
@dbus_service_method(config.dbus.DBUS_INTERFACE_CONFIG_IPSET,
in_signature='s', out_signature='b')
@dbus_handle_exceptions
def queryEntry(self, entry, sender=None): # pylint: disable=W0613
entry = dbus_to_python(entry, str)
entry = normalize_ipset_entry(entry)
log.debug1("%s.queryEntry('%s')", self._log_prefix, entry)
settings = list(self.getSettings())
if "timeout" in settings[4] and settings[4]["timeout"] != "0":
raise FirewallError(errors.IPSET_WITH_TIMEOUT)
return entry in settings[5]