# # Copyright (C) 2015 eNovance SAS # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. # # == Define: tripleo::firewall::rule # # Define used to manage IPtables rules. # # === Parameters: # # [*ipversion*] # (optional) The IP-version associated to the rule. # If not set the rule will be created for both IPv4 and IPv6. # Defaults to undef # # [*port*] # (optional) The port associated to the rule. # Defaults to undef # # [*dport*] # (optional) The destination port associated to the rule. # Defaults to undef # # [*sport*] # (optional) The source port associated to the rule. # Defaults to undef # # [*proto*] # (optional) The protocol associated to the rule. # Defaults to 'tcp' # # [*action*] # (optional) The action policy associated to the rule. # Defaults to 'accept' # # [*jump*] # (optional) The chain to jump to. # If present, overrides action # # [*table*] # (optional) The table where the rule is created. # Defaults to undef # # [*state*] # (optional) Array of states associated to the rule.. # Defaults to ['NEW'] # # [*source*] # (optional) The source IP address associated to the rule. # Defaults to undef # # [*iniface*] # (optional) The network interface associated to the rule. # Defaults to undef # # [*chain*] # (optional) The chain associated to the rule. # Defaults to 'INPUT' # # [*destination*] # (optional) The destination cidr associated to the rule. # Defaults to undef # # [*tag*] # (optional) tag to add to the resource definition. # Used to order any rule that is not pre and post to happen in between # pre and post rules # Defaults to 'tripleo-firewall-rule' # # [*extras*] # (optional) Hash of any puppetlabs-firewall supported parameters. # Defaults to {} # define tripleo::firewall::rule ( $ipversion = undef, $port = undef, $dport = undef, $sport = undef, $proto = 'tcp', $action = 'accept', $state = ['NEW'], $source = undef, $iniface = undef, $chain = 'INPUT', $destination = undef, $extras = {}, $jump = undef, $table = undef, $tag = 'tripleo-firewall-rule', ) { if $ipversion == 'all' { $ipversion_real = undef } else { $ipversion_real = $ipversion } if $port == 'all' { warning("All ${proto} traffic will be open on this host.") # undef so the IPtables rule won't have any port specified. $port_real = undef } else { $port_real = $port } if $jump != undef { $jump_real = $jump $action_real = undef } else { $jump_real = undef $action_real = $action } $basic = { 'port' => $port_real, 'dport' => $dport, 'sport' => $sport, 'proto' => $proto, 'action' => $action_real, 'source' => $source, 'iniface' => $iniface, 'chain' => $chain, 'destination' => $destination, 'jump' => $jump_real, 'table' => $table, 'tag' => $tag, } if $ipversion_real != undef { if $ipversion_real == 'ipv6' { $ipv4 = undef $ipv6 = {'provider' => 'ip6tables'} } if $ipversion_real == 'ipv4' { $ipv4 = {'provider' => 'iptables'} $ipv6 = undef } } else { $ipv4 = {'provider' => 'iptables'} if $proto == 'icmp' { $ipv6 = { 'provider' => 'ip6tables', 'proto' => 'ipv6-icmp', } } else { $ipv6 = {'provider' => 'ip6tables'} } } if $proto != 'gre' { $state_rule = { 'state' => $state } } else { $state_rule = {} } if $ipv4 != undef { $ipv4_rule = merge($basic, $state_rule, $ipv4, $extras) validate_legacy(Hash, 'validate_hash', $ipv4_rule) } if $ipv6 != undef { $ipv6_rule = merge($basic, $state_rule, $ipv6, $extras) validate_legacy(Hash, 'validate_hash', $ipv6_rule) } # This conditional will ensure that TCP and UDP firewall rules have # a port specified in the configuration when using INPUT or OUTPUT chains. # If not, the Puppet catalog will fail. # If we don't do this sanity check, a user could create some TCP/UDP # rules without port, and the result would be an iptables rule that allow any # traffic on the host. if ($proto in ['tcp', 'udp']) and (! ($port or $dport or $sport) and ($chain != 'FORWARD') and ($table != 'nat')) { fail("${title} firewall rule cannot be created. TCP or UDP rules for INPUT or OUTPUT need port or sport or dport.") } if $source or $destination { if (/[.]/ in $destination or /[.]/ in $source) { create_resources('firewall', { "${title} ipv4" => $ipv4_rule }) } if (/[:]/ in $destination or /[:]/ in $source) { create_resources('firewall', { "${title} ipv6" => $ipv6_rule }) } } else { if $ipv4 != undef { create_resources('firewall', { "${title} ipv4" => $ipv4_rule }) } if $ipv6 != undef { create_resources('firewall', { "${title} ipv6" => $ipv6_rule }) } } }