7264c75c37
Add the posibility to add 'ipversion' to the firewall rule manifest. Closes-Bug: #1845153 Change-Id: Id872c55cfc6b958fef3ccda2d923f821a1fe6a13
204 lines
5.4 KiB
Puppet
204 lines
5.4 KiB
Puppet
#
|
|
# Copyright (C) 2015 eNovance SAS <licensing@enovance.com>
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
# == Define: tripleo::firewall::rule
|
|
#
|
|
# Define used to manage IPtables rules.
|
|
#
|
|
# === Parameters:
|
|
#
|
|
# [*ipversion*]
|
|
# (optional) The IP-version associated to the rule.
|
|
# If not set the rule will be created for both IPv4 and IPv6.
|
|
# Defaults to undef
|
|
#
|
|
# [*port*]
|
|
# (optional) The port associated to the rule.
|
|
# Defaults to undef
|
|
#
|
|
# [*dport*]
|
|
# (optional) The destination port associated to the rule.
|
|
# Defaults to undef
|
|
#
|
|
# [*sport*]
|
|
# (optional) The source port associated to the rule.
|
|
# Defaults to undef
|
|
#
|
|
# [*proto*]
|
|
# (optional) The protocol associated to the rule.
|
|
# Defaults to 'tcp'
|
|
#
|
|
# [*action*]
|
|
# (optional) The action policy associated to the rule.
|
|
# Defaults to 'accept'
|
|
#
|
|
# [*jump*]
|
|
# (optional) The chain to jump to.
|
|
# If present, overrides action
|
|
#
|
|
# [*table*]
|
|
# (optional) The table where the rule is created.
|
|
# Defaults to undef
|
|
#
|
|
# [*state*]
|
|
# (optional) Array of states associated to the rule..
|
|
# Defaults to ['NEW']
|
|
#
|
|
# [*source*]
|
|
# (optional) The source IP address associated to the rule.
|
|
# Defaults to undef
|
|
#
|
|
# [*iniface*]
|
|
# (optional) The network interface associated to the rule.
|
|
# Defaults to undef
|
|
#
|
|
# [*chain*]
|
|
# (optional) The chain associated to the rule.
|
|
# Defaults to 'INPUT'
|
|
#
|
|
# [*destination*]
|
|
# (optional) The destination cidr associated to the rule.
|
|
# Defaults to undef
|
|
#
|
|
# [*tag*]
|
|
# (optional) tag to add to the resource definition.
|
|
# Used to order any rule that is not pre and post to happen in between
|
|
# pre and post rules
|
|
# Defaults to 'tripleo-firewall-rule'
|
|
#
|
|
# [*extras*]
|
|
# (optional) Hash of any puppetlabs-firewall supported parameters.
|
|
# Defaults to {}
|
|
#
|
|
define tripleo::firewall::rule (
|
|
$ipversion = undef,
|
|
$port = undef,
|
|
$dport = undef,
|
|
$sport = undef,
|
|
$proto = 'tcp',
|
|
$action = 'accept',
|
|
$state = ['NEW'],
|
|
$source = undef,
|
|
$iniface = undef,
|
|
$chain = 'INPUT',
|
|
$destination = undef,
|
|
$extras = {},
|
|
$jump = undef,
|
|
$table = undef,
|
|
$tag = 'tripleo-firewall-rule',
|
|
) {
|
|
|
|
if $ipversion == 'all' {
|
|
$ipversion_real = undef
|
|
} else {
|
|
$ipversion_real = $ipversion
|
|
}
|
|
|
|
if $port == 'all' {
|
|
warning("All ${proto} traffic will be open on this host.")
|
|
# undef so the IPtables rule won't have any port specified.
|
|
$port_real = undef
|
|
} else {
|
|
$port_real = $port
|
|
}
|
|
|
|
if $jump != undef {
|
|
$jump_real = $jump
|
|
$action_real = undef
|
|
} else {
|
|
$jump_real = undef
|
|
$action_real = $action
|
|
}
|
|
|
|
$basic = {
|
|
'port' => $port_real,
|
|
'dport' => $dport,
|
|
'sport' => $sport,
|
|
'proto' => $proto,
|
|
'action' => $action_real,
|
|
'source' => $source,
|
|
'iniface' => $iniface,
|
|
'chain' => $chain,
|
|
'destination' => $destination,
|
|
'jump' => $jump_real,
|
|
'table' => $table,
|
|
'tag' => $tag,
|
|
}
|
|
|
|
if $ipversion_real != undef {
|
|
if $ipversion_real == 'ipv6' {
|
|
$ipv4 = undef
|
|
$ipv6 = {'provider' => 'ip6tables'}
|
|
}
|
|
if $ipversion_real == 'ipv4' {
|
|
$ipv4 = {'provider' => 'iptables'}
|
|
$ipv6 = undef
|
|
}
|
|
} else {
|
|
$ipv4 = {'provider' => 'iptables'}
|
|
if $proto == 'icmp' {
|
|
$ipv6 = {
|
|
'provider' => 'ip6tables',
|
|
'proto' => 'ipv6-icmp',
|
|
}
|
|
} else {
|
|
$ipv6 = {'provider' => 'ip6tables'}
|
|
}
|
|
}
|
|
|
|
if $proto != 'gre' {
|
|
$state_rule = {
|
|
'state' => $state
|
|
}
|
|
} else {
|
|
$state_rule = {}
|
|
}
|
|
|
|
if $ipv4 != undef {
|
|
$ipv4_rule = merge($basic, $state_rule, $ipv4, $extras)
|
|
validate_legacy(Hash, 'validate_hash', $ipv4_rule)
|
|
}
|
|
if $ipv6 != undef {
|
|
$ipv6_rule = merge($basic, $state_rule, $ipv6, $extras)
|
|
validate_legacy(Hash, 'validate_hash', $ipv6_rule)
|
|
}
|
|
|
|
# This conditional will ensure that TCP and UDP firewall rules have
|
|
# a port specified in the configuration when using INPUT or OUTPUT chains.
|
|
# If not, the Puppet catalog will fail.
|
|
# If we don't do this sanity check, a user could create some TCP/UDP
|
|
# rules without port, and the result would be an iptables rule that allow any
|
|
# traffic on the host.
|
|
if ($proto in ['tcp', 'udp']) and (! ($port or $dport or $sport) and ($chain != 'FORWARD') and ($table != 'nat')) {
|
|
fail("${title} firewall rule cannot be created. TCP or UDP rules for INPUT or OUTPUT need port or sport or dport.")
|
|
}
|
|
if $source or $destination {
|
|
if (/[.]/ in $destination or /[.]/ in $source) {
|
|
create_resources('firewall', { "${title} ipv4" => $ipv4_rule })
|
|
}
|
|
if (/[:]/ in $destination or /[:]/ in $source) {
|
|
create_resources('firewall', { "${title} ipv6" => $ipv6_rule })
|
|
}
|
|
} else {
|
|
if $ipv4 != undef {
|
|
create_resources('firewall', { "${title} ipv4" => $ipv4_rule })
|
|
}
|
|
if $ipv6 != undef {
|
|
create_resources('firewall', { "${title} ipv6" => $ipv6_rule })
|
|
}
|
|
}
|
|
|
|
}
|