puppet-tripleo/manifests/firewall/rule.pp
Harald Jensås 7264c75c37 Add 'ipversion' to firewall/rule.pp
Add the posibility to add 'ipversion' to the firewall
rule manifest.

Closes-Bug: #1845153
Change-Id: Id872c55cfc6b958fef3ccda2d923f821a1fe6a13
2019-09-25 18:36:44 +00:00

204 lines
5.4 KiB
Puppet

#
# Copyright (C) 2015 eNovance SAS <licensing@enovance.com>
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# == Define: tripleo::firewall::rule
#
# Define used to manage IPtables rules.
#
# === Parameters:
#
# [*ipversion*]
# (optional) The IP-version associated to the rule.
# If not set the rule will be created for both IPv4 and IPv6.
# Defaults to undef
#
# [*port*]
# (optional) The port associated to the rule.
# Defaults to undef
#
# [*dport*]
# (optional) The destination port associated to the rule.
# Defaults to undef
#
# [*sport*]
# (optional) The source port associated to the rule.
# Defaults to undef
#
# [*proto*]
# (optional) The protocol associated to the rule.
# Defaults to 'tcp'
#
# [*action*]
# (optional) The action policy associated to the rule.
# Defaults to 'accept'
#
# [*jump*]
# (optional) The chain to jump to.
# If present, overrides action
#
# [*table*]
# (optional) The table where the rule is created.
# Defaults to undef
#
# [*state*]
# (optional) Array of states associated to the rule..
# Defaults to ['NEW']
#
# [*source*]
# (optional) The source IP address associated to the rule.
# Defaults to undef
#
# [*iniface*]
# (optional) The network interface associated to the rule.
# Defaults to undef
#
# [*chain*]
# (optional) The chain associated to the rule.
# Defaults to 'INPUT'
#
# [*destination*]
# (optional) The destination cidr associated to the rule.
# Defaults to undef
#
# [*tag*]
# (optional) tag to add to the resource definition.
# Used to order any rule that is not pre and post to happen in between
# pre and post rules
# Defaults to 'tripleo-firewall-rule'
#
# [*extras*]
# (optional) Hash of any puppetlabs-firewall supported parameters.
# Defaults to {}
#
define tripleo::firewall::rule (
$ipversion = undef,
$port = undef,
$dport = undef,
$sport = undef,
$proto = 'tcp',
$action = 'accept',
$state = ['NEW'],
$source = undef,
$iniface = undef,
$chain = 'INPUT',
$destination = undef,
$extras = {},
$jump = undef,
$table = undef,
$tag = 'tripleo-firewall-rule',
) {
if $ipversion == 'all' {
$ipversion_real = undef
} else {
$ipversion_real = $ipversion
}
if $port == 'all' {
warning("All ${proto} traffic will be open on this host.")
# undef so the IPtables rule won't have any port specified.
$port_real = undef
} else {
$port_real = $port
}
if $jump != undef {
$jump_real = $jump
$action_real = undef
} else {
$jump_real = undef
$action_real = $action
}
$basic = {
'port' => $port_real,
'dport' => $dport,
'sport' => $sport,
'proto' => $proto,
'action' => $action_real,
'source' => $source,
'iniface' => $iniface,
'chain' => $chain,
'destination' => $destination,
'jump' => $jump_real,
'table' => $table,
'tag' => $tag,
}
if $ipversion_real != undef {
if $ipversion_real == 'ipv6' {
$ipv4 = undef
$ipv6 = {'provider' => 'ip6tables'}
}
if $ipversion_real == 'ipv4' {
$ipv4 = {'provider' => 'iptables'}
$ipv6 = undef
}
} else {
$ipv4 = {'provider' => 'iptables'}
if $proto == 'icmp' {
$ipv6 = {
'provider' => 'ip6tables',
'proto' => 'ipv6-icmp',
}
} else {
$ipv6 = {'provider' => 'ip6tables'}
}
}
if $proto != 'gre' {
$state_rule = {
'state' => $state
}
} else {
$state_rule = {}
}
if $ipv4 != undef {
$ipv4_rule = merge($basic, $state_rule, $ipv4, $extras)
validate_legacy(Hash, 'validate_hash', $ipv4_rule)
}
if $ipv6 != undef {
$ipv6_rule = merge($basic, $state_rule, $ipv6, $extras)
validate_legacy(Hash, 'validate_hash', $ipv6_rule)
}
# This conditional will ensure that TCP and UDP firewall rules have
# a port specified in the configuration when using INPUT or OUTPUT chains.
# If not, the Puppet catalog will fail.
# If we don't do this sanity check, a user could create some TCP/UDP
# rules without port, and the result would be an iptables rule that allow any
# traffic on the host.
if ($proto in ['tcp', 'udp']) and (! ($port or $dport or $sport) and ($chain != 'FORWARD') and ($table != 'nat')) {
fail("${title} firewall rule cannot be created. TCP or UDP rules for INPUT or OUTPUT need port or sport or dport.")
}
if $source or $destination {
if (/[.]/ in $destination or /[.]/ in $source) {
create_resources('firewall', { "${title} ipv4" => $ipv4_rule })
}
if (/[:]/ in $destination or /[:]/ in $source) {
create_resources('firewall', { "${title} ipv6" => $ipv6_rule })
}
} else {
if $ipv4 != undef {
create_resources('firewall', { "${title} ipv4" => $ipv4_rule })
}
if $ipv6 != undef {
create_resources('firewall', { "${title} ipv6" => $ipv6_rule })
}
}
}