yast/yast-yast2

View on GitHub
library/network/src/lib/network/firewalld.rb

Summary

Maintainability
B
5 hrs
Test Coverage
#
# ***************************************************************************
#
# Copyright (c) 2016 SUSE LLC.
# All Rights Reserved.
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of version 2 or 3 of the GNU General
# Public License as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.   See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, contact SUSE LLC.
#
# To contact SUSE about this file by physical or electronic mail,
# you may find current contact information at www.suse.com
#
# ***************************************************************************
#
# File: lib/network/firewalld.rb
# Summary:  FirewallD configuration API
# Authors:  Karol Mroz <kmroz@suse.de>, Markos Chandras <mchandras@suse.de>
#

require "yast"
require "shellwords"

module Firewalld
  # exception when firewall-cmd fails
  class FirewallCMDError < StandardError
  end

  # Execute firewalld commands using firewall-cmd
  class FWCmd
    include Yast::Logger

    BASH_SCR_PATH = Yast::Path.new(".target.bash_output")
    # Base firewall-cmd command
    COMMAND = "LANG=C /usr/bin/firewall-cmd".freeze

    attr_reader :option_str

    def initialize(option_str)
      @option_str = option_str
    end

    def command
      "#{COMMAND} #{option_str}".strip.squeeze(" ")
    end

    # @param output [Boolean] Whether command output is desirable or not
    # @return [String] Firewalld command output if output = true
    # @return [Boolean] Firewalld command exit code if output = false
    def fwd_output(output = true)
      cmd_result = Yast::SCR.Execute(BASH_SCR_PATH, command)

      # See firewall-cmd manpage for exit codes. Not all of them justify an
      # exception. 0 and 1 can be used as true and false respectively.
      case cmd_result["exit"]
      when 0, 1
        if output
          cmd_result["stdout"]
        else
          log.debug "#{command} returned: #{cmd_result["stdout"]}"
          cmd_result["exit"].zero?
        end
      else
        raise FirewallCMDError, "Calling firewall-cmd (cmd: #{command}) failed: #{cmd_result["stderr"]}"
      end
    end
  end

  # The firewalld API. We only use the command line interface.
  class FirewalldAPI
    def self.create(type = :bash)
      case type
      when :bash
        FirewalldBashAPI.new
      when :dbus
        nil
      else
        raise "Unsupported Firewalld API type: #{type}"
      end
    end
  end

  # The firewalld bash API
  class FirewalldBashAPI
    include Yast::Logger

  private

    # Simple wrapper for commands. Returns true on success
    def fwd_quiet_result(*args)
      fwcmd = FWCmd.new(args.join)
      fwcmd.fwd_output(false)
    end

    # Simple wrapper for commands. Returns command output
    def fwd_result(*args)
      fwcmd = FWCmd.new(args.join)
      fwcmd.fwd_output(true)
    end

  public

    ### State ###

    # @return [Boolean] The firewalld service state (exit code)
    def running?
      fwd_quiet_result("--state")
    end

    # @return [Boolean] The firewalld reload result (exit code)
    def reload
      fwd_quiet_result("--reload")
    end

    # @return [Boolean] The firewalld complete-reload result (exit code)
    def complete_reload
      fwd_quiet_result("--complete-reload")
    end

    # @return [Boolean] The firewalld runtime-to-permanent result (exit code)
    def make_permanent
      fwd_quiet_result("--runtime-to-permanent")
    end

    ### Zones ####

    # @return [Array<String>] List of firewall zones
    def zones
      fwd_result("--permanent --get-zones").split
    end

    # @param zone [String] The firewall zone
    # @return [Array<String>] list of zone's interfaces
    def list_interfaces(zone)
      fwd_result("--permanent --zone=#{zone.shellescape} --list-interfaces").split
    end

    # @param zone [String] The firewall zone
    # @return [Arrray<String>] list of zone's services
    def list_services(zone)
      fwd_result("--permanent --zone=#{zone.shellescape} --list-services").split
    end

    # @param zone [String] The firewall zone
    # @return [Array<String>] list of zone's ports
    def list_ports(zone)
      fwd_result("--permanent --zone=#{zone.shellescape} --list-ports").split
    end

    # @param zone [String] The firewall zone
    # @return [Array<String>] list of zone's protocols
    def list_protocols(zone)
      fwd_result("--permanent --zone=#{zone.shellescape} --list-protocols").split
    end

    # @param zone [String] The firewall zone
    # @return [Array<String>] list of all information for given zone
    def list_all(zone)
      fwd_result("--permanent --zone=#{zone.shellescape} --list-all").split
    end

    # @return [Array<String>] list of all information for all firewall zones
    def list_all_zones
      fwd_result("--permanent --list-all-zones").split("\n")
    end

    ### Interfaces ###

    # @param zone [String] The firewall zone
    # @param interface [String] The network interface
    # @return [Boolean] True if interface is assigned to zone
    def interface_enabled?(zone, interface)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --query-interface=#{interface.shellescape}")
    end

    # @param zone [String] The firewall zone
    # @param interface [String] The network interface
    # @return [Boolean] True if interface was added to zone
    def add_interface(zone, interface)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --add-interface=#{interface.shellescape}")
    end

    # @param zone [String] The firewall zone
    # @param interface [String] The network interface
    # @return [Boolean] True if interface was removed from zone
    def remove_interface(zone, interface)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --remove-interface=#{interface.shellescape}")
    end

    ### Services ###

    # @return [Array<String>] List of firewall services
    def services
      fwd_result("--permanent --get-services").split
    end

    # @param service [String] The firewall service
    # @return [Array<String>] list of all information for the given service
    def info_service(service)
      fwd_result("--permanent --info-service #{service.shellescape}").split("\n")
    end

    # @param service [String] The firewall service
    # @return [String] Short description for service
    def service_short(service)
      # these may not exist on early firewalld releases
      fwd_result("--permanent --service=#{service.shellescape} --get-short").rstrip
    end

    # @param service [String] the firewall service
    # @return [String] Description for service
    def service_description(service)
      fwd_result("--permanent --service=#{service.shellescape} --get-description").rstrip
    end

    # @param service [String] The firewall service
    # @return [Boolean] True if service definition exists
    def service_supported?(service)
      services.include?(service)
    end

    # @param zone [String] The firewall zone
    # @param service [String] The firewall service
    # @return [Boolean] True if service is enabled in zone
    def service_enabled?(zone, service)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --query-service=#{service.shellescape}")
    end

    # @param service [String] The firewall service
    # @return [Array<String>] The firewall service ports
    def service_ports(service)
      fwd_result("--permanent --service=#{service.shellescape} --get-ports").strip
    end

    # @param service [String] The firewall service
    # @return [Array<String>] The firewall service protocols
    def service_protocols(service)
      fwd_result("--permanent --service=#{service.shellescape} --get-protocols").strip
    end

    # @param service [String] The firewall service
    # @return [Array<String>] The firewall service modules
    def service_modules(service)
      fwd_result("--permanent --service=#{service.shellescape} --get-modules").strip
    end

    # @param zone [String] The firewall zone
    # @param port [String] The firewall port
    # @return [Boolean] True if port is enabled in zone
    def port_enabled?(zone, port)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --query-port=#{port}")
    end

    # @param zone [String] The firewall zone
    # @param protocol [String] The zone protocol
    # @return [Boolean] True if protocol is enabled in zone
    def protocol_enabled?(zone, protocol)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --query-protocol=#{protocol}")
    end

    # @param zone [String] The firewall zone
    # @param service [String] The firewall service
    # @return [Boolean] True if service was added to zone
    def add_service(zone, service)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --add-service=#{service.shellescape}")
    end

    # @param zone [String] The firewall zone
    # @param port [String] The firewall port
    # @return [Boolean] True if port was added to zone
    def add_port(zone, port)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --add-port=#{port.shellescape}")
    end

    # @param zone [String] The firewall zone
    # @param protocol [String] The firewall protocol
    # @return [Boolean] True if protocol was added to zone
    def add_protocol(zone, protocol)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --add-protocol=#{protocol.shellescape}")
    end

    # @param zone [String] The firewall zone
    # @param service [String] The firewall service
    # @return [Boolean] True if service was removed from zone
    def remove_service(zone, service)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --remove-service=#{service.shellescape}")
    end

    # @param zone [String] The firewall zone
    # @param port [String] The firewall port
    # @return [Boolean] True if port was removed from zone
    def remove_port(zone, port)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --remove-port=#{port.shellescape}")
    end

    # @param zone [String] The firewall zone
    # @param protocol [String] The firewall protocol
    # @return [Boolean] True if protocol was removed from zone
    def remove_protocol(zone, protocol)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --remove-protocol=#{protocol.shellescape}")
    end

    # @param zone [String] The firewall zone
    # @return [Boolean] True if masquerade is enabled in zone
    def masquerade_enabled?(zone)
      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --query-masquerade")
    end

    # @param zone [String] The firewall zone
    # @return [Boolean] True if masquerade was enabled in zone
    def add_masquerade(zone)
      return true if masquerade_enabled?(zone)

      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --add-masquerade")
    end

    # @param zone [String] The firewall zone
    # @return [Boolean] True if masquerade was removed in zone
    def remove_masquerade(zone)
      return true if !masquerade_enabled?(zone)

      fwd_quiet_result("--permanent --zone=#{zone.shellescape} --remove-masquerade")
    end

    ### Logging ###

    # @param kind [String] Denied packets to log. Possible values are:
    # all, unicast, broadcast, multicast and off
    # @return [Boolean] True if desired packet type is being logged when denied
    def log_denied_packets?(kind)
      (fwd_result("--get-log-denied").strip == kind)
    end

    # @param kind [String] Denied packets to log. Possible values are:
    # all, unicast, broadcast, multicast and off
    # @return [Boolean] True if desired packet type was set to being logged
    # when denied
    def log_denied_packets=(kind)
      fwd_quiet_result("--set-log-denied=#{kind.to_s.shellescape}")
    end

    # @return [String] packet type which is being logged when denied
    def log_denied_packets
      fwd_result("--get-log-denied").strip
    end
  end
end