[pdm-devel] [PATCH proxmox-yew-comp 2/4] firewall: add FirewallContext

Hannes Laimer h.laimer at proxmox.com
Thu Oct 30 15:34:00 CET 2025


Both the options edit form and the rules table share the same layout for
multiple endpoints/entities. This unifies that so we can use the same
components by just initialising this context depending on where we get
our data from or have to send it to.

Signed-off-by: Hannes Laimer <h.laimer at proxmox.com>
---
 src/firewall/context.rs | 142 ++++++++++++++++++++++++++++++++++++++++
 src/firewall/mod.rs     |   2 +
 src/lib.rs              |   3 +
 3 files changed, 147 insertions(+)
 create mode 100644 src/firewall/context.rs
 create mode 100644 src/firewall/mod.rs

diff --git a/src/firewall/context.rs b/src/firewall/context.rs
new file mode 100644
index 0000000..6495fa3
--- /dev/null
+++ b/src/firewall/context.rs
@@ -0,0 +1,142 @@
+use crate::percent_encoding::percent_encode_component;
+use pwt::prelude::*;
+
+/// Context defining the scope of firewall configuration (Cluster, Node, or Guest level)
+#[derive(Clone, PartialEq)]
+pub enum FirewallContext {
+    Cluster {
+        remote: AttrValue,
+    },
+    Node {
+        remote: AttrValue,
+        node: AttrValue,
+    },
+    Guest {
+        remote: AttrValue,
+        node: AttrValue,
+        vmid: u64,
+        vmtype: AttrValue,
+    },
+}
+
+impl FirewallContext {
+    pub fn cluster(remote: impl Into<AttrValue>) -> Self {
+        Self::Cluster {
+            remote: remote.into(),
+        }
+    }
+
+    pub fn node(remote: impl Into<AttrValue>, node: impl Into<AttrValue>) -> Self {
+        Self::Node {
+            remote: remote.into(),
+            node: node.into(),
+        }
+    }
+
+    pub fn guest(
+        remote: impl Into<AttrValue>,
+        node: impl Into<AttrValue>,
+        vmid: u64,
+        vmtype: impl Into<AttrValue>,
+    ) -> Self {
+        Self::Guest {
+            remote: remote.into(),
+            node: node.into(),
+            vmid,
+            vmtype: vmtype.into(),
+        }
+    }
+
+    pub fn rules_url(&self) -> String {
+        match self {
+            Self::Cluster { remote } => {
+                format!(
+                    "/pve/remotes/{}/firewall/rules",
+                    percent_encode_component(remote)
+                )
+            }
+            Self::Node { remote, node } => {
+                format!(
+                    "/pve/remotes/{}/nodes/{}/firewall/rules",
+                    percent_encode_component(remote),
+                    percent_encode_component(node)
+                )
+            }
+            Self::Guest {
+                remote,
+                node,
+                vmid,
+                vmtype,
+            } => {
+                let mut url = format!(
+                    "/pve/remotes/{}/{}/{}/firewall/rules",
+                    percent_encode_component(remote),
+                    percent_encode_component(vmtype),
+                    vmid
+                );
+                if !node.is_empty() {
+                    url = format!("{}?node={}", url, percent_encode_component(node));
+                }
+                url
+            }
+        }
+    }
+
+    pub fn options_url(&self) -> String {
+        match self {
+            Self::Cluster { remote } => {
+                format!(
+                    "/pve/remotes/{}/firewall/options",
+                    percent_encode_component(remote)
+                )
+            }
+            Self::Node { remote, node } => {
+                format!(
+                    "/pve/remotes/{}/nodes/{}/firewall/options",
+                    percent_encode_component(remote),
+                    percent_encode_component(node)
+                )
+            }
+            Self::Guest {
+                remote,
+                node,
+                vmid,
+                vmtype,
+            } => {
+                let mut url = format!(
+                    "/pve/remotes/{}/{}/{}/firewall/options",
+                    percent_encode_component(remote),
+                    percent_encode_component(vmtype),
+                    vmid
+                );
+                if !node.is_empty() {
+                    url = format!("{}?node={}", url, percent_encode_component(node));
+                }
+                url
+            }
+        }
+    }
+
+    pub fn title(&self, prefix: &str) -> String {
+        match self {
+            Self::Cluster { remote } => {
+                if !remote.is_empty() {
+                    format!("{}: {}", prefix, remote)
+                } else {
+                    prefix.to_string()
+                }
+            }
+            Self::Node { remote, node } => {
+                format!("{}: {}/{}", prefix, remote, node)
+            }
+            Self::Guest {
+                remote,
+                vmtype,
+                vmid,
+                ..
+            } => {
+                format!("{}: {}/{} {}", prefix, remote, vmtype.to_uppercase(), vmid)
+            }
+        }
+    }
+}
diff --git a/src/firewall/mod.rs b/src/firewall/mod.rs
new file mode 100644
index 0000000..49dcf23
--- /dev/null
+++ b/src/firewall/mod.rs
@@ -0,0 +1,2 @@
+mod context;
+pub use context::FirewallContext;
diff --git a/src/lib.rs b/src/lib.rs
index 3a9e32b..e2e2721 100644
--- a/src/lib.rs
+++ b/src/lib.rs
@@ -129,6 +129,9 @@ mod rrd_timeframe_selector;
 #[cfg(feature = "rrd")]
 pub use rrd_timeframe_selector::{RRDTimeframe, RRDTimeframeSelector};
 
+mod firewall;
+pub use firewall::FirewallContext;
+
 mod running_tasks;
 pub use running_tasks::{ProxmoxRunningTasks, RunningTasks};
 
-- 
2.47.3





More information about the pdm-devel mailing list