netavark 1.16.1

A container network stack
Documentation
use std::{
    ffi::{OsStr, OsString},
    path::Path,
};

use zbus::{blocking::Connection, proxy, proxy::CacheProperties};

use crate::{
    error::{ErrorWrap, NetavarkResult},
    firewall::{get_supported_firewall_driver, state::read_fw_config},
    network::constants,
};

#[proxy(
    interface = "org.fedoraproject.FirewallD1",
    default_service = "org.fedoraproject.FirewallD1",
    default_path = "/org/fedoraproject/FirewallD1"
)]
trait FirewallDDbus {}

const SIGNAL_NAME: &str = "Reloaded";

pub fn listen(config_dir: Option<OsString>) -> NetavarkResult<()> {
    let config_dir = Path::new(
        config_dir
            .as_deref()
            .unwrap_or(OsStr::new(constants::DEFAULT_CONFIG_DIR)),
    );
    log::debug!("looking for firewall configs in {config_dir:?}");

    let conn = Connection::system()?;
    let proxy = FirewallDDbusProxyBlocking::builder(&conn)
        .cache_properties(CacheProperties::No)
        .build()?;

    let conn_option = Some(conn);

    // Setup fw rules on start because we are started after firewalld
    // this means at the time firewalld stated the fw rules were flushed
    // and we need to add them back.
    // It is important to keep things like "systemctl restart firewalld" working.
    reload_rules(config_dir, &conn_option);

    // This loops forever until the process is killed or there is some dbus error.
    for _ in proxy.0.receive_signal(SIGNAL_NAME)? {
        log::debug!("got firewalld {SIGNAL_NAME} signal");
        reload_rules(config_dir, &conn_option);
    }

    Ok(())
}

fn reload_rules(config_dir: &Path, conn: &Option<Connection>) {
    if let Err(e) = reload_rules_inner(config_dir, conn) {
        log::error!("failed to reload firewall rules: {e}");
    }
}

fn reload_rules_inner(config_dir: &Path, conn: &Option<Connection>) -> NetavarkResult<()> {
    let conf = read_fw_config(config_dir).wrap("read firewall config")?;
    // If we got no conf there are no containers so nothing to do.
    if let Some(conf) = conf {
        let fw_driver = get_supported_firewall_driver(Some(conf.driver))?;

        for net in conf.net_confs {
            fw_driver.setup_network(net, conn)?;
        }
        for port in &conf.port_confs {
            fw_driver.setup_port_forward(port.into(), conn)?;
        }
        log::info!("Successfully reloaded firewall rules");
    }

    Ok(())
}