ezipset


Nameezipset JSON
Version 1.0.0 PyPI version JSON
download
home_pagehttps://github.com/rabuchaim/ezIPSet
SummaryIPSet is a lightweight and fast Python library for manipulating IPSet rules. No dependencies, pure Python!
upload_time2024-08-02 04:56:26
maintainerRicardo Abuchaim
docs_urlNone
authorRicardo Abuchaim
requires_python>=3.7
licenseMIT
keywords ip ipset libipset libipset.so ctypes iptables ezipset eziptables purepython pure firewall rules tools
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # ezIPSet v1.0.0

## Introduction
ezIPSet is a pure Python library that provides a convenient way to manage ipset rules. It allows you to interact with IPSet using Python code, making it easier to create, modify, and delete IPSet sets. This library includes all the functions existing in IPSet and works with protocols 6 and 7 of IPSet.

## Installation of ezIPSet Library

```shell
pip install ezIPSet
```

## Installation of ipset extension for iptables

IPSet is an extension for IPTables and allows you to manipulate tens of thousands of rules. To check if you have this extension installed on your Linux distribution, type `ipset --version`. If you get an error, you can easily install it with the command below.

For available methods in `ipset`, please refer to the IPSet website [https://ipset.netfilter.org/](https://ipset.netfilter.org/) or IPSet man pages [https://ipset.netfilter.org/ipset.man.html](https://ipset.netfilter.org/ipset.man.html).

> *Installing this extension has no impact on the operation of IPTables.*

For Ubuntu/Debian:
```shell
apt update
apt install ipset
```

For RedHat/CentOS/Amazon Linux:
```shell
yum install ipset
```

## Usage
Once you have installed ezIPSet, you can start using it in your Python code. Here's a basic example:

```python
Python 3.12.4 (main, Jun  8 2024, 18:29:57) [GCC 11.4.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> from ezipset import ezIPSet
>>> import json
>>> ipset = ezIPSet(raise_on_errors=False)
>>> ipset.version
'7.15'
>>> ipset.protocol
7
>>> ipset.set_names
['']
>>> ipset.create_set('IPSET_EXAMPLE1',set_type='hash:net',family='inet',timeout=1200,with_comment=True)
True
>>> ipset.create_set('IPSET_EXAMPLE2',set_type='hash:net',family='inet',with_comment=True)
True
>>> ipset.set_names
['IPSET_EXAMPLE1', 'IPSET_EXAMPLE2']
>>> 
>>> ipset.add_entry('IPSET_EXAMPLE1',"1.2.3.4/32",timeout=600,comment='just a comment for 1.2.3.4/32',ignore_if_exists=True)
True
>>> ipset.add_entry('IPSET_EXAMPLE1',"4.5.6.0/24",comment='the 4.5.6.0/24 network')
True
>>> ipset.add_entry('IPSET_EXAMPLE2',"10.20.30.0/24",comment='internal network')
True
>>> 
>>> ipset.add_entry('IPSET_EXAMPLE1',"4.5.6.0/24",comment='the 4.5.6.0/24 network')
False
>>> ipset.last_command_output
"ipset v7.15: Element cannot be added to the set: it's already added"
>>> 
>>> example1 = ipset.get_set("IPSET_EXAMPLE1")
>>> ipset.last_command_elapsed_time
'0.002981348'
>>> print(example1)
{'name': 'IPSET_EXAMPLE1', 'type': 'hash:net', 'revision': 7, 'header': {'bucketsize': 12, 'comment': True, 'family': 'inet', 'hashsize': 1024, 'initval': '0xb433b7ea', 'maxelem': 65536, 'timeout': 1200}, 'header_orig_line': 'family inet hashsize 1024 maxelem 65536 timeout 1200 comment bucketsize 12 initval 0xb433b7ea', 'size_in_memory': 701, 'references': 0, 'number_of_entries': 2, 'members': {'1.2.3.4': {'timeout': 507, 'comment': 'just a comment for 1.2.3.4/32'}, '4.5.6.0/24': {'timeout': 1112, 'comment': 'the 4.5.6.0/24 network'}}}
>>> print(json.dumps(example1,indent=3,sort_keys=False))
{
   "name": "IPSET_EXAMPLE1",
   "type": "hash:net",
   "revision": 7,
   "header": {
      "bucketsize": 12,
      "comment": true,
      "family": "inet",
      "hashsize": 1024,
      "initval": "0xb433b7ea",
      "maxelem": 65536,
      "timeout": 1200
   },
   "header_orig_line": "family inet hashsize 1024 maxelem 65536 timeout 1200 comment bucketsize 12 initval 0xb433b7ea",
   "size_in_memory": 701,
   "references": 0,
   "number_of_entries": 2,
   "members": {
      "1.2.3.4": {
         "timeout": 507,
         "comment": "just a comment for 1.2.3.4/32"
      },
      "4.5.6.0/24": {
         "timeout": 1112,
         "comment": "the 4.5.6.0/24 network"
      }
   }
}
>>> 
>>> example2_header = ipset.get_set_header("IPSET_EXAMPLE2")
>>> print(json.dumps(example2_header,indent=3,sort_keys=False))
{
   "name": "IPSET_EXAMPLE2",
   "type": "hash:net",
   "revision": 7,
   "header": {
      "bucketsize": 12,
      "comment": true,
      "family": "inet",
      "hashsize": 1024,
      "initval": "0xd1ea7d18",
      "maxelem": 65536
   },
   "header_orig_line": "family inet hashsize 1024 maxelem 65536 comment bucketsize 12 initval 0xd1ea7d18",
   "size_in_memory": 553,
   "references": 0,
   "number_of_entries": 1
}
>>> 
>>> example2_members = ipset.get_set_members("IPSET_EXAMPLE2")
>>> print(json.dumps(example2_members,indent=3,sort_keys=False))
{
   "10.20.30.0/24": {
      "comment": "internal network"
   }
}
```
## Methods and Properties 

### The creation of the object

- ```def __init__(self, ipset_command:str='ipset', command_timeout:int=5, raise_on_errors:bool=True, debug:bool=False, **kwargs):```

    - **`ipset_command`**: If the operating system's ipset command has been renamed, then provide the new name here. The command specified here will be inserted at the beginning of every command line you execute.
    - **`command_timeout`**: self explanatory. You can change this value at any time by accessing the `command_timeout` property without having to create the object again. If you're working with multiple 50K rule sets, you may need to increase this to 10 seconds or more. In stress tests, everything ran in under 2~3 seconds.
    - **`raise_on_errors`**: This is a good option to avoid exceptions. If you prefer to handle exceptions by your own, set this option to `True`, otherwise keep it as `False` and the function returns will never raise an exception, it will always be `True` or `False`.
    - **`debug`**: In this option, the executed commands and the outputs are displayed with a highlighted color in case you need to resolve any atypical situation that may be occurring with the library. Before opening an issue, run with this flag as `True` to monitor the behavior. It is also possible to activate the debug flag without touching the code by exporting an environment variable like this: `export EZIPSET_DEBUG=1`

    With each command executed, 3 properties are populated automatically:

    - **`set_names`**: This is the current list of names of all existing ipset sets. You do not need to keep calling the get_set_names() function. This property changes every time you create, rename or destroy a set.
    - **`last_command_elapsed_time`**: Here the elapsed time of the last command executed is recorded, in case you need to keep track of the elapsed times and adjust the `command_timeout` property if necessary.
    - **`last_command_output`**: If you chose `raise_on_errors=False` and some command returned "False", access this property to see the error message that the IPSet returned.

    When manipulating many dictionaries and lists, you need to pay attention to the memory consumption of these variables. A sporadic call or two will not cause problems, but in an application that manages firewall rules hundreds or thousands of times per hour, this becomes a problem. With ezIPSet you can use it as a context and release all the memory used by the library as soon as you leave the context block. Example:

    ```
    with ezIPSet() as ipset:
        all_sets = ipset.get_all_sets()
        print(ipset.set_names)
        print(json.dumps(ipset.VALID_SET_TYPES,indent=3,sort_keys=False))
    ```

### Methods

All methods have a doc string detailing all parameters. For more info, please refer to the [IPSet man page](https://ipset.netfilter.org/ipset.man).

- **`get_ezipset_version()`**: Returns the version of the ezIPSet library.

- **`get_ipset_version()`**: Returns the current version of IPSet. Or you can call the properties: `ipset().version` or `ipset().protocol`

- **`save(to_file,gzipped=False,compression_level=9,overwrite_if_exists=False)`**: Saves the current IPSet rules to a file if the parameter `to_file` is given, or returns the output if `to_file` is None.

- **`restore(file_to_restore:str,skip_create_sets=False,skip_add_entries=False,ignore_if_exists=False)`**: Restores the IPSet rules from a file. You can skip the 'create' commands in the file or skip the 'add' commands in the file and use a compressed file also.

- **`destroy_set(setname)`**: Destroys an IPSet set. *There is no UNDO action!*

- **`destroy_all()`**: Self explanatory. *There is no UNDO action!*

- **`rename_set(old_setname,new_setname)`**: Renames an IPSet set

- **`swap_set(setname_from,setname_to)`**: Swaps two IPSet sets. The referred sets must exist and compatible type of sets can be swapped only.

- **`flush_set(setname)`**: Deletes all members of an IPSet set.

- **`flush_all()`**: Self explanatory. *There is no UNDO action!*

- **`get_set_names()`**: Returns only a list with the names of the system's IPSet sets.

- **`get_set(setname,with_members=True,sorted=False)`**: Returns a dictionary with all the information and members of the set specified in the `setname` parameter.

- **`get_set_header(setname)`**: Returns a dictionary with only the header information of the set specified in the `setname` parameter.

- **`get_set_members(setname,sorted=False)`**: Returns a dictionary with only the members information of the set specified in the `setname` parameter.

- **`get_all_sets(with_members=True,sorted=False)`**: Returns a list of dictionaries containing all information about all IPSets in the system.

- **`add_entry(set_name,entry,timeout=None,comment=None,packets=None,bytes=None,skbmark=None,skbprio=None,skbqueue=None,ignore_if_exists=False)`**: Adds a member to the IPSet given in the setname parameter. Depending on how the set was created, you can pass other parameters if desired.

- **`test_entry(set_name,entry,raise_on_test_failed=False)`**: Tests if an entry is in the specified set. The `raise_on_test_failed` parameter overrides the `raise_on_errors` parameter that was set when the object was created, in case you don't want to handle an exception at the time you want to test whether the member exists or not.

- **`del_entry(set_name,entry,ignore_if_not_exists=False,raise_if_not_exists=False)`**: Deletes a member of an IPSet set. The `ignore_if_not_exists` parameter make the function always return True. And the `raise_if_not_exists` parameter overrides the one defined at the creation of the object in case you do not want to handle an exception when deleting a member of the set.

- **`create_set(set_name,set_type,family,timeout=None,with_comment=False,with_counters=False,with_skbinfo=False,nomatch=False,forceadd=False,wildcard=False,hashsize=None,maxelem=None,bucketsize=None,ignore_if_exists=False)`**: Creates a set according to the parameters provided. You can see the `ezIPSet().VALID_SET_TYPES` property, which is a dictionary with all accepted set_types and possible combinations of extra parameters accepted. See the [IPSet man page](https://ipset.netfilter.org/ipset.man) for more details, it is very complete and easy to understand.

- **`ezIPSet().VALID_SET_TYPES`**: is a property with all accepted set_types and possible combinations.
    ```
    with ezIPSet() as ipset:
        print(json.dumps(ipset.VALID_SET_TYPES,indent=3,sort_keys=False))

    {
    "hash:ip": [
        "counters",
        "comment",
        "forceadd",
        "skbinfo",
        "bucketsize"
    ],
    "hash:ip,mac": [
        "bucketsize"
    ],
    "hash:ip,mark": [
        "forceadd",
        "skbinfo",
        "bucketsize"
    ],
    ...
    }
    ```

## ezIPSet Minimal Library

In the library directory you will find the `ezipset_min.py` file, which is a complete and minified version of the library with only 220 lines, which allows you to copy the code and include it in your application, avoiding a dependency : )

The minified version was made with [python-minifier](https://github.com/dflook/python-minifier)  and is obviously difficult to read, but it is completely functional and identical to the normal version. It is just an option.

## Contributing
If you find any issues or have suggestions for improvements, feel free to contribute to the ezIPSet project. 

## License
ezIPSet is licensed under the MIT License. See the [LICENSE](https://github.com/example/ezIPSet/blob/main/LICENSE) file for more information.

## Sugestions, feedbacks, bugs...

[Open an issue](https://github.com/rabuchaim/ezIPSet/issues) or e-mail me: ricardoabuchaim at gmail.com

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/rabuchaim/ezIPSet",
    "name": "ezipset",
    "maintainer": "Ricardo Abuchaim",
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": "ricardoabuchaim@gmail.com",
    "keywords": "ip, ipset, libipset, libipset.so, ctypes, iptables, ezipset, eziptables, purepython, pure, firewall, rules, tools",
    "author": "Ricardo Abuchaim",
    "author_email": "ricardoabuchaim@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/4d/8b/14f5bf9fa198e3b33f1ac81d7ea98632baede04195cef7df64f9af574423/ezipset-1.0.0.tar.gz",
    "platform": null,
    "description": "# ezIPSet v1.0.0\n\n## Introduction\nezIPSet is a pure Python library that provides a convenient way to manage ipset rules. It allows you to interact with IPSet using Python code, making it easier to create, modify, and delete IPSet sets. This library includes all the functions existing in IPSet and works with protocols 6 and 7 of IPSet.\n\n## Installation of ezIPSet Library\n\n```shell\npip install ezIPSet\n```\n\n## Installation of ipset extension for iptables\n\nIPSet is an extension for IPTables and allows you to manipulate tens of thousands of rules. To check if you have this extension installed on your Linux distribution, type `ipset --version`. If you get an error, you can easily install it with the command below.\n\nFor available methods in `ipset`, please refer to the IPSet website [https://ipset.netfilter.org/](https://ipset.netfilter.org/) or IPSet man pages [https://ipset.netfilter.org/ipset.man.html](https://ipset.netfilter.org/ipset.man.html).\n\n> *Installing this extension has no impact on the operation of IPTables.*\n\nFor Ubuntu/Debian:\n```shell\napt update\napt install ipset\n```\n\nFor RedHat/CentOS/Amazon Linux:\n```shell\nyum install ipset\n```\n\n## Usage\nOnce you have installed ezIPSet, you can start using it in your Python code. Here's a basic example:\n\n```python\nPython 3.12.4 (main, Jun  8 2024, 18:29:57) [GCC 11.4.0] on linux\nType \"help\", \"copyright\", \"credits\" or \"license\" for more information.\n>>> from ezipset import ezIPSet\n>>> import json\n>>> ipset = ezIPSet(raise_on_errors=False)\n>>> ipset.version\n'7.15'\n>>> ipset.protocol\n7\n>>> ipset.set_names\n['']\n>>> ipset.create_set('IPSET_EXAMPLE1',set_type='hash:net',family='inet',timeout=1200,with_comment=True)\nTrue\n>>> ipset.create_set('IPSET_EXAMPLE2',set_type='hash:net',family='inet',with_comment=True)\nTrue\n>>> ipset.set_names\n['IPSET_EXAMPLE1', 'IPSET_EXAMPLE2']\n>>> \n>>> ipset.add_entry('IPSET_EXAMPLE1',\"1.2.3.4/32\",timeout=600,comment='just a comment for 1.2.3.4/32',ignore_if_exists=True)\nTrue\n>>> ipset.add_entry('IPSET_EXAMPLE1',\"4.5.6.0/24\",comment='the 4.5.6.0/24 network')\nTrue\n>>> ipset.add_entry('IPSET_EXAMPLE2',\"10.20.30.0/24\",comment='internal network')\nTrue\n>>> \n>>> ipset.add_entry('IPSET_EXAMPLE1',\"4.5.6.0/24\",comment='the 4.5.6.0/24 network')\nFalse\n>>> ipset.last_command_output\n\"ipset v7.15: Element cannot be added to the set: it's already added\"\n>>> \n>>> example1 = ipset.get_set(\"IPSET_EXAMPLE1\")\n>>> ipset.last_command_elapsed_time\n'0.002981348'\n>>> print(example1)\n{'name': 'IPSET_EXAMPLE1', 'type': 'hash:net', 'revision': 7, 'header': {'bucketsize': 12, 'comment': True, 'family': 'inet', 'hashsize': 1024, 'initval': '0xb433b7ea', 'maxelem': 65536, 'timeout': 1200}, 'header_orig_line': 'family inet hashsize 1024 maxelem 65536 timeout 1200 comment bucketsize 12 initval 0xb433b7ea', 'size_in_memory': 701, 'references': 0, 'number_of_entries': 2, 'members': {'1.2.3.4': {'timeout': 507, 'comment': 'just a comment for 1.2.3.4/32'}, '4.5.6.0/24': {'timeout': 1112, 'comment': 'the 4.5.6.0/24 network'}}}\n>>> print(json.dumps(example1,indent=3,sort_keys=False))\n{\n   \"name\": \"IPSET_EXAMPLE1\",\n   \"type\": \"hash:net\",\n   \"revision\": 7,\n   \"header\": {\n      \"bucketsize\": 12,\n      \"comment\": true,\n      \"family\": \"inet\",\n      \"hashsize\": 1024,\n      \"initval\": \"0xb433b7ea\",\n      \"maxelem\": 65536,\n      \"timeout\": 1200\n   },\n   \"header_orig_line\": \"family inet hashsize 1024 maxelem 65536 timeout 1200 comment bucketsize 12 initval 0xb433b7ea\",\n   \"size_in_memory\": 701,\n   \"references\": 0,\n   \"number_of_entries\": 2,\n   \"members\": {\n      \"1.2.3.4\": {\n         \"timeout\": 507,\n         \"comment\": \"just a comment for 1.2.3.4/32\"\n      },\n      \"4.5.6.0/24\": {\n         \"timeout\": 1112,\n         \"comment\": \"the 4.5.6.0/24 network\"\n      }\n   }\n}\n>>> \n>>> example2_header = ipset.get_set_header(\"IPSET_EXAMPLE2\")\n>>> print(json.dumps(example2_header,indent=3,sort_keys=False))\n{\n   \"name\": \"IPSET_EXAMPLE2\",\n   \"type\": \"hash:net\",\n   \"revision\": 7,\n   \"header\": {\n      \"bucketsize\": 12,\n      \"comment\": true,\n      \"family\": \"inet\",\n      \"hashsize\": 1024,\n      \"initval\": \"0xd1ea7d18\",\n      \"maxelem\": 65536\n   },\n   \"header_orig_line\": \"family inet hashsize 1024 maxelem 65536 comment bucketsize 12 initval 0xd1ea7d18\",\n   \"size_in_memory\": 553,\n   \"references\": 0,\n   \"number_of_entries\": 1\n}\n>>> \n>>> example2_members = ipset.get_set_members(\"IPSET_EXAMPLE2\")\n>>> print(json.dumps(example2_members,indent=3,sort_keys=False))\n{\n   \"10.20.30.0/24\": {\n      \"comment\": \"internal network\"\n   }\n}\n```\n## Methods and Properties \n\n### The creation of the object\n\n- ```def __init__(self, ipset_command:str='ipset', command_timeout:int=5, raise_on_errors:bool=True, debug:bool=False, **kwargs):```\n\n    - **`ipset_command`**: If the operating system's ipset command has been renamed, then provide the new name here. The command specified here will be inserted at the beginning of every command line you execute.\n    - **`command_timeout`**: self explanatory. You can change this value at any time by accessing the `command_timeout` property without having to create the object again. If you're working with multiple 50K rule sets, you may need to increase this to 10 seconds or more. In stress tests, everything ran in under 2~3 seconds.\n    - **`raise_on_errors`**: This is a good option to avoid exceptions. If you prefer to handle exceptions by your own, set this option to `True`, otherwise keep it as `False` and the function returns will never raise an exception, it will always be `True` or `False`.\n    - **`debug`**: In this option, the executed commands and the outputs are displayed with a highlighted color in case you need to resolve any atypical situation that may be occurring with the library. Before opening an issue, run with this flag as `True` to monitor the behavior. It is also possible to activate the debug flag without touching the code by exporting an environment variable like this: `export EZIPSET_DEBUG=1`\n\n    With each command executed, 3 properties are populated automatically:\n\n    - **`set_names`**: This is the current list of names of all existing ipset sets. You do not need to keep calling the get_set_names() function. This property changes every time you create, rename or destroy a set.\n    - **`last_command_elapsed_time`**: Here the elapsed time of the last command executed is recorded, in case you need to keep track of the elapsed times and adjust the `command_timeout` property if necessary.\n    - **`last_command_output`**: If you chose `raise_on_errors=False` and some command returned \"False\", access this property to see the error message that the IPSet returned.\n\n    When manipulating many dictionaries and lists, you need to pay attention to the memory consumption of these variables. A sporadic call or two will not cause problems, but in an application that manages firewall rules hundreds or thousands of times per hour, this becomes a problem. With ezIPSet you can use it as a context and release all the memory used by the library as soon as you leave the context block. Example:\n\n    ```\n    with ezIPSet() as ipset:\n        all_sets = ipset.get_all_sets()\n        print(ipset.set_names)\n        print(json.dumps(ipset.VALID_SET_TYPES,indent=3,sort_keys=False))\n    ```\n\n### Methods\n\nAll methods have a doc string detailing all parameters. For more info, please refer to the [IPSet man page](https://ipset.netfilter.org/ipset.man).\n\n- **`get_ezipset_version()`**: Returns the version of the ezIPSet library.\n\n- **`get_ipset_version()`**: Returns the current version of IPSet. Or you can call the properties: `ipset().version` or `ipset().protocol`\n\n- **`save(to_file,gzipped=False,compression_level=9,overwrite_if_exists=False)`**: Saves the current IPSet rules to a file if the parameter `to_file` is given, or returns the output if `to_file` is None.\n\n- **`restore(file_to_restore:str,skip_create_sets=False,skip_add_entries=False,ignore_if_exists=False)`**: Restores the IPSet rules from a file. You can skip the 'create' commands in the file or skip the 'add' commands in the file and use a compressed file also.\n\n- **`destroy_set(setname)`**: Destroys an IPSet set. *There is no UNDO action!*\n\n- **`destroy_all()`**: Self explanatory. *There is no UNDO action!*\n\n- **`rename_set(old_setname,new_setname)`**: Renames an IPSet set\n\n- **`swap_set(setname_from,setname_to)`**: Swaps two IPSet sets. The referred sets must exist and compatible type of sets can be swapped only.\n\n- **`flush_set(setname)`**: Deletes all members of an IPSet set.\n\n- **`flush_all()`**: Self explanatory. *There is no UNDO action!*\n\n- **`get_set_names()`**: Returns only a list with the names of the system's IPSet sets.\n\n- **`get_set(setname,with_members=True,sorted=False)`**: Returns a dictionary with all the information and members of the set specified in the `setname` parameter.\n\n- **`get_set_header(setname)`**: Returns a dictionary with only the header information of the set specified in the `setname` parameter.\n\n- **`get_set_members(setname,sorted=False)`**: Returns a dictionary with only the members information of the set specified in the `setname` parameter.\n\n- **`get_all_sets(with_members=True,sorted=False)`**: Returns a list of dictionaries containing all information about all IPSets in the system.\n\n- **`add_entry(set_name,entry,timeout=None,comment=None,packets=None,bytes=None,skbmark=None,skbprio=None,skbqueue=None,ignore_if_exists=False)`**: Adds a member to the IPSet given in the setname parameter. Depending on how the set was created, you can pass other parameters if desired.\n\n- **`test_entry(set_name,entry,raise_on_test_failed=False)`**: Tests if an entry is in the specified set. The `raise_on_test_failed` parameter overrides the `raise_on_errors` parameter that was set when the object was created, in case you don't want to handle an exception at the time you want to test whether the member exists or not.\n\n- **`del_entry(set_name,entry,ignore_if_not_exists=False,raise_if_not_exists=False)`**: Deletes a member of an IPSet set. The `ignore_if_not_exists` parameter make the function always return True. And the `raise_if_not_exists` parameter overrides the one defined at the creation of the object in case you do not want to handle an exception when deleting a member of the set.\n\n- **`create_set(set_name,set_type,family,timeout=None,with_comment=False,with_counters=False,with_skbinfo=False,nomatch=False,forceadd=False,wildcard=False,hashsize=None,maxelem=None,bucketsize=None,ignore_if_exists=False)`**: Creates a set according to the parameters provided. You can see the `ezIPSet().VALID_SET_TYPES` property, which is a dictionary with all accepted set_types and possible combinations of extra parameters accepted. See the [IPSet man page](https://ipset.netfilter.org/ipset.man) for more details, it is very complete and easy to understand.\n\n- **`ezIPSet().VALID_SET_TYPES`**: is a property with all accepted set_types and possible combinations.\n    ```\n    with ezIPSet() as ipset:\n        print(json.dumps(ipset.VALID_SET_TYPES,indent=3,sort_keys=False))\n\n    {\n    \"hash:ip\": [\n        \"counters\",\n        \"comment\",\n        \"forceadd\",\n        \"skbinfo\",\n        \"bucketsize\"\n    ],\n    \"hash:ip,mac\": [\n        \"bucketsize\"\n    ],\n    \"hash:ip,mark\": [\n        \"forceadd\",\n        \"skbinfo\",\n        \"bucketsize\"\n    ],\n    ...\n    }\n    ```\n\n## ezIPSet Minimal Library\n\nIn the library directory you will find the `ezipset_min.py` file, which is a complete and minified version of the library with only 220 lines, which allows you to copy the code and include it in your application, avoiding a dependency : )\n\nThe minified version was made with [python-minifier](https://github.com/dflook/python-minifier)  and is obviously difficult to read, but it is completely functional and identical to the normal version. It is just an option.\n\n## Contributing\nIf you find any issues or have suggestions for improvements, feel free to contribute to the ezIPSet project. \n\n## License\nezIPSet is licensed under the MIT License. See the [LICENSE](https://github.com/example/ezIPSet/blob/main/LICENSE) file for more information.\n\n## Sugestions, feedbacks, bugs...\n\n[Open an issue](https://github.com/rabuchaim/ezIPSet/issues) or e-mail me: ricardoabuchaim at gmail.com\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "IPSet is a lightweight and fast Python library for manipulating IPSet rules. No dependencies, pure Python!",
    "version": "1.0.0",
    "project_urls": {
        "Homepage": "https://github.com/rabuchaim/ezIPSet",
        "Issue Tracker": "https://github.com/rabuchaim/ezIPSet/issues",
        "Source code": "https://github.com/rabuchaim/ezIPSet"
    },
    "split_keywords": [
        "ip",
        " ipset",
        " libipset",
        " libipset.so",
        " ctypes",
        " iptables",
        " ezipset",
        " eziptables",
        " purepython",
        " pure",
        " firewall",
        " rules",
        " tools"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "4d8b14f5bf9fa198e3b33f1ac81d7ea98632baede04195cef7df64f9af574423",
                "md5": "9cff238eca56acaa09f8cf12f2cbc82a",
                "sha256": "f4077b325e3db579ee33dae2b93ab8ec7962ce3a864a9bf82b06d992ea5fd825"
            },
            "downloads": -1,
            "filename": "ezipset-1.0.0.tar.gz",
            "has_sig": false,
            "md5_digest": "9cff238eca56acaa09f8cf12f2cbc82a",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 33679,
            "upload_time": "2024-08-02T04:56:26",
            "upload_time_iso_8601": "2024-08-02T04:56:26.931446Z",
            "url": "https://files.pythonhosted.org/packages/4d/8b/14f5bf9fa198e3b33f1ac81d7ea98632baede04195cef7df64f9af574423/ezipset-1.0.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-08-02 04:56:26",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "rabuchaim",
    "github_project": "ezIPSet",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "lcname": "ezipset"
}
        
Elapsed time: 0.31797s