Crates.io | windows_firewall |
lib.rs | windows_firewall |
version | |
source | src |
created_at | 2025-04-15 19:01:06.545929+00 |
updated_at | 2025-04-22 22:54:26.042356+00 |
description | A crate for managing Windows Firewall rules and settings. |
homepage | |
repository | https://github.com/lhenry-dev/windows-firewall-rs |
max_upload_size | |
id | 1635048 |
Cargo.toml error: | TOML parse error at line 19, column 1 | 19 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include` |
size | 0 |
A Rust crate for managing Windows Firewall rules and settings using the Windows API in Rust.
Add this to your Cargo.toml
:
[target.'cfg(windows)'.dependencies]
windows_firewall = "0.1.0"
use windows_firewall::{
add_rule, remove_rule, rule_exists, update_rule, WindowsFirewallRule, WindowsFirewallRuleSettings,
ActionFirewallWindows, DirectionFirewallWindows, ProtocolFirewallWindows
};
// Create a new rule
let mut rule = WindowsFirewallRule::builder()
.name("TestHTTPRule")
.action(ActionFirewallWindows::Allow)
.direction(DirectionFirewallWindows::In)
.enabled(true)
.description("Test HTTP rule")
.protocol(ProtocolFirewallWindows::Tcp)
.local_ports([80])
.build();
// Add the rule
match add_rule(&rule) {
Ok(_) => println!("Rule added successfully"),
Err(e) => eprintln!("Failed to add rule: {}", e),
};
// Verify the rule exists
match rule_exists("TestHTTPRule") {
Ok(exists) => println!("Rule exists: {}", exists),
Err(e) => eprintln!("Failed to check rule: {}", e),
};
let updated_settings = WindowsFirewallRuleSettings::builder()
.enabled(false)
.description("Updated test HTTP rule")
.build();
// Update the rule
match update_rule("TestHTTPRule", &updated_settings) {
Ok(_) => println!("Rule updated successfully"),
Err(e) => eprintln!("Failed to update rule: {}", e),
};
// Remove the rule
match remove_rule("TestHTTPRule") {
Ok(_) => println!("Rule removed successfully"),
Err(e) => eprintln!("Failed to remove rule: {}", e),
};
use windows_firewall::{
WindowsFirewallRule, WindowsFirewallRuleSettings,
ActionFirewallWindows, DirectionFirewallWindows, ProtocolFirewallWindows
};
// Create a new firewall rule
let mut rule = WindowsFirewallRule::builder()
.name("TestDNSServerRule")
.action(ActionFirewallWindows::Allow)
.direction(DirectionFirewallWindows::In)
.enabled(true)
.description("Test DNS Server rule")
.protocol(ProtocolFirewallWindows::Udp)
.local_ports([53])
.build();
// Add the rule
match rule.add() {
Ok(_) => println!("DNS Server rule added successfully"),
Err(e) => eprintln!("Failed to add DNS Server rule: {}", e),
};
// Verify the rule exists
match rule.exists() {
Ok(exists) => println!("Rule exists: {}", exists),
Err(e) => eprintln!("Failed to check rule: {}", e),
};
let updated_settings = WindowsFirewallRuleSettings::builder()
.enabled(false)
.description("Updated DNS Server rule")
.build();
// Update the rule
match rule.update(&updated_settings) {
Ok(_) => println!("DNS Server rule updated successfully"),
Err(e) => eprintln!("Failed to update DNS Server rule: {}", e),
};
// Remove the rule
match rule.remove() {
Ok(_) => println!("DNS Server rule removed successfully"),
Err(e) => eprintln!("Failed to remove DNS Server rule: {}", e),
};
use windows_firewall::{get_firewall_state, ProfileFirewallWindows};
match get_firewall_state(ProfileFirewallWindows::Public) {
Ok(enabled) => println!("Firewall is {}", if enabled { "enabled" } else { "disabled" }),
Err(e) => eprintln!("Failed to get firewall state: {}", e),
}
use windows_firewall::list_rules;
match list_rules() {
Ok(rules) => {
for rule in rules {
println!("Rule: {}", rule.name());
println!(" Direction: {:?}", rule.direction());
println!(" Action: {:?}", rule.action());
println!(" Enabled: {}", rule.enabled());
}
},
Err(e) => eprintln!("Failed to list rules: {}", e),
}
For issues and questions:
This project is licensed under either of
at your option.