2016-02-04 15:39:50 +02:00
|
|
|
/*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright 2016 Joyent, Inc.
|
|
|
|
*
|
|
|
|
* `triton fwrule update ...`
|
|
|
|
*/
|
|
|
|
|
|
|
|
var assert = require('assert-plus');
|
|
|
|
var format = require('util').format;
|
|
|
|
var fs = require('fs');
|
|
|
|
var vasync = require('vasync');
|
|
|
|
|
|
|
|
var common = require('../common');
|
|
|
|
var errors = require('../errors');
|
|
|
|
var UPDATE_FIREWALL_RULE_FIELDS
|
|
|
|
= require('../cloudapi2').CloudApi.prototype.UPDATE_FIREWALL_RULE_FIELDS;
|
|
|
|
|
|
|
|
|
|
|
|
function do_update(subcmd, opts, args, cb) {
|
|
|
|
if (opts.help) {
|
|
|
|
this.do_help('help', {}, [subcmd], cb);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
var log = this.log;
|
|
|
|
var tritonapi = this.top.tritonapi;
|
|
|
|
|
|
|
|
if (args.length === 0) {
|
|
|
|
cb(new errors.UsageError('Missing FWRULE-ID argument'));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
var id = args.pop();
|
|
|
|
|
|
|
|
vasync.pipeline({arg: {}, funcs: [
|
|
|
|
function gatherDataArgs(ctx, next) {
|
|
|
|
if (opts.file) {
|
|
|
|
next();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
ctx.data = common.objFromKeyValueArgs(args, {
|
|
|
|
disableDotted: true,
|
|
|
|
typeHintFromKey: UPDATE_FIREWALL_RULE_FIELDS
|
|
|
|
});
|
|
|
|
} catch (err) {
|
|
|
|
next(err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
next();
|
|
|
|
},
|
|
|
|
|
|
|
|
function gatherDataFile(ctx, next) {
|
|
|
|
if (!opts.file || opts.file === '-') {
|
|
|
|
next();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
var input = fs.readFileSync(opts.file, 'utf8');
|
|
|
|
|
|
|
|
try {
|
|
|
|
ctx.data = JSON.parse(input);
|
|
|
|
} catch (err) {
|
|
|
|
next(new errors.TritonError(format(
|
|
|
|
'invalid JSON for firewall rule update in "%s": %s',
|
|
|
|
opts.file, err)));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
next();
|
|
|
|
},
|
|
|
|
|
|
|
|
function gatherDataStdin(ctx, next) {
|
|
|
|
if (opts.file !== '-') {
|
|
|
|
next();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
var stdin = '';
|
|
|
|
|
|
|
|
process.stdin.resume();
|
|
|
|
process.stdin.on('data', function (chunk) {
|
|
|
|
stdin += chunk;
|
|
|
|
});
|
|
|
|
|
|
|
|
process.stdin.on('end', function () {
|
|
|
|
try {
|
|
|
|
ctx.data = JSON.parse(stdin);
|
|
|
|
} catch (err) {
|
|
|
|
log.trace({stdin: stdin},
|
|
|
|
'invalid firewall rule update JSON on stdin');
|
|
|
|
next(new errors.TritonError(format(
|
|
|
|
'invalid JSON for firewall rule update on stdin: %s',
|
|
|
|
err)));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
next();
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
function validateIt(ctx, next) {
|
|
|
|
var keys = Object.keys(ctx.data);
|
2016-02-05 14:54:13 +02:00
|
|
|
|
|
|
|
if (keys.length === 0) {
|
|
|
|
console.log('No fields given for firewall rule update');
|
|
|
|
next();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-02-04 15:39:50 +02:00
|
|
|
for (var i = 0; i < keys.length; i++) {
|
|
|
|
var key = keys[i];
|
|
|
|
var value = ctx.data[key];
|
|
|
|
var type = UPDATE_FIREWALL_RULE_FIELDS[key];
|
|
|
|
if (!type) {
|
|
|
|
next(new errors.UsageError(format('unknown or ' +
|
|
|
|
'unupdateable field: %s (updateable fields are: %s)',
|
|
|
|
key,
|
|
|
|
Object.keys(UPDATE_FIREWALL_RULE_FIELDS).sort().join(
|
|
|
|
', '))));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (typeof (value) !== type) {
|
|
|
|
next(new errors.UsageError(format('field "%s" must be ' +
|
|
|
|
'of type "%s", but got a value of type "%s"', key,
|
|
|
|
type, typeof (value))));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
next();
|
|
|
|
},
|
|
|
|
|
2016-02-05 14:54:13 +02:00
|
|
|
// we need to look up the full UUID if the given id is a short id
|
|
|
|
function getFullId(ctx, next) {
|
|
|
|
if (common.isUUID(id)) {
|
|
|
|
ctx.data.id = id;
|
2016-02-04 15:39:50 +02:00
|
|
|
next();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-02-05 14:54:13 +02:00
|
|
|
tritonapi.getFirewallRule(id, function onRule(err, fwrule) {
|
|
|
|
if (err) {
|
|
|
|
next(err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.data.id = fwrule.id;
|
|
|
|
|
|
|
|
next();
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
function updateAway(ctx, next) {
|
|
|
|
var data = ctx.data;
|
2016-02-04 15:39:50 +02:00
|
|
|
|
2016-02-05 14:54:13 +02:00
|
|
|
tritonapi.cloudapi.updateFirewallRule(data, function (err) {
|
2016-02-04 15:39:50 +02:00
|
|
|
if (err) {
|
|
|
|
next(err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-02-05 14:54:13 +02:00
|
|
|
delete data.id;
|
2016-02-04 15:39:50 +02:00
|
|
|
console.log('Updated firewall rule %s (fields: %s)', id,
|
2016-02-05 14:54:13 +02:00
|
|
|
Object.keys(data).join(', '));
|
2016-02-04 15:39:50 +02:00
|
|
|
|
|
|
|
next();
|
|
|
|
});
|
|
|
|
}
|
|
|
|
]}, cb);
|
|
|
|
}
|
|
|
|
|
|
|
|
do_update.options = [
|
|
|
|
{
|
|
|
|
names: ['help', 'h'],
|
|
|
|
type: 'bool',
|
|
|
|
help: 'Show this help.'
|
|
|
|
},
|
|
|
|
{
|
|
|
|
names: ['file', 'f'],
|
|
|
|
type: 'string',
|
|
|
|
helpArg: 'FILE',
|
|
|
|
help: 'A file holding a JSON file of updates, or "-" to read ' +
|
|
|
|
'JSON from stdin.'
|
|
|
|
}
|
|
|
|
];
|
|
|
|
do_update.help = [
|
|
|
|
'Update a firewall rule',
|
|
|
|
'',
|
|
|
|
'Usage:',
|
|
|
|
' {{name}} update [FIELD=VALUE ...] FWRULE-ID',
|
|
|
|
' {{name}} update -f JSON-FILE FWRULE-ID',
|
|
|
|
'',
|
|
|
|
'{{options}}',
|
|
|
|
|
|
|
|
'Updateable fields:',
|
|
|
|
' ' + Object.keys(UPDATE_FIREWALL_RULE_FIELDS).sort().map(function (f) {
|
|
|
|
return f + ' (' + UPDATE_FIREWALL_RULE_FIELDS[f] + ')';
|
|
|
|
}).join('\n '),
|
|
|
|
''
|
|
|
|
].join('\n');
|
|
|
|
|
|
|
|
do_update.completionArgtypes = ['tritonupdatefwrulefield'];
|
|
|
|
|
|
|
|
module.exports = do_update;
|