# # Copyright (C) 2015 eNovance SAS # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. # # == Define: tripleo::firewall::rule # # Define used to manage IPtables rules. # # === Parameters: # # [*port*] # (optional) The port associated to the rule. # Defaults to undef # # [*dport*] # (optional) The destination port associated to the rule. # Defaults to undef # # [*sport*] # (optional) The source port associated to the rule. # Defaults to undef # # [*proto*] # (optional) The protocol associated to the rule. # Defaults to 'tcp' # # [*action*] # (optional) The action policy associated to the rule. # Defaults to 'accept' # # [*jump*] # (optional) The chain to jump to. # If present, overrides action # # [*state*] # (optional) Array of states associated to the rule.. # Defaults to ['NEW'] # # [*source*] # (optional) The source IP address associated to the rule. # Defaults to undef # # [*iniface*] # (optional) The network interface associated to the rule. # Defaults to undef # # [*chain*] # (optional) The chain associated to the rule. # Defaults to 'INPUT' # # [*destination*] # (optional) The destination cidr associated to the rule. # Defaults to undef # # [*extras*] # (optional) Hash of any puppetlabs-firewall supported parameters. # Defaults to {} # define tripleo::firewall::rule ( $port = undef, $dport = undef, $sport = undef, $proto = 'tcp', $action = 'accept', $state = ['NEW'], $source = undef, $iniface = undef, $chain = 'INPUT', $destination = undef, $extras = {}, $jump = undef, ) { if $port == 'all' { warning("All ${proto} traffic will be open on this host.") # undef so the IPtables rule won't have any port specified. $port_real = undef } else { $port_real = $port } if $jump != undef { $jump_real = $jump $action_real = undef } else { $jump_real = undef $action_real = $action } $basic = { 'port' => $port_real, 'dport' => $dport, 'sport' => $sport, 'proto' => $proto, 'action' => $action_real, 'source' => $source, 'iniface' => $iniface, 'chain' => $chain, 'destination' => $destination, 'jump' => $jump_real, } if $proto == 'icmp' { $ipv6 = { 'provider' => 'ip6tables', 'proto' => 'ipv6-icmp', } } else { $ipv6 = { 'provider' => 'ip6tables', } } if $proto != 'gre' { $state_rule = { 'state' => $state } } else { $state_rule = {} } $ipv4_rule = merge($basic, $state_rule, $extras) $ipv6_rule = merge($basic, $state_rule, $ipv6, $extras) validate_hash($ipv4_rule) validate_hash($ipv6_rule) # This conditional will ensure that TCP and UDP firewall rules have # a port specified in the configuration when using INPUT or OUTPUT chains. # If not, the Puppet catalog will fail. # If we don't do this sanity check, a user could create some TCP/UDP # rules without port, and the result would be an iptables rule that allow any # traffic on the host. if ($proto in ['tcp', 'udp']) and (! ($port or $dport or $sport) and ($chain != 'FORWARD')) { fail("${title} firewall rule cannot be created. TCP or UDP rules for INPUT or OUTPUT need port or sport or dport.") } if $source or $destination { if ('.' in $destination or '.' in $source) { create_resources('firewall', { "${title} ipv4" => $ipv4_rule }) } if (':' in $destination or ':' in $source) { create_resources('firewall', { "${title} ipv6" => $ipv6_rule }) } } else { create_resources('firewall', { "${title} ipv4" => $ipv4_rule }) create_resources('firewall', { "${title} ipv6" => $ipv6_rule }) } }