Compare commits
35 commits
cdn-ops-20
...
main
Author | SHA1 | Date | |
---|---|---|---|
5489eeeb7a | |||
39e1db9c32 | |||
f7dd464ed7 | |||
db2b4ca409 | |||
f638e4c6f4 | |||
c386349271 | |||
29c81d13a0 | |||
cb46a3b6fb | |||
58dc985e12 | |||
dc7bf71dd9 | |||
f1b4d5ad07 | |||
7a91f6df19 | |||
206e450c99 | |||
3cc1b602fd | |||
61f47320a7 | |||
b121790b77 | |||
17219fd226 | |||
728ed4126f | |||
c82df547ee | |||
85afb706ed | |||
78894e7500 | |||
e7efc59870 | |||
f27eb9c07d | |||
0447b7b106 | |||
56b16a6d44 | |||
da099a5e53 | |||
6d6f1b632d | |||
2e49e12c70 | |||
dba0e2e107 | |||
0a61c8ad28 | |||
57dcae2cdf | |||
f537508bee | |||
|
028ba3d608 | ||
7941e3f970 | |||
fac9a556ba |
16 changed files with 358 additions and 48 deletions
33
edit-secrets
33
edit-secrets
|
@ -67,6 +67,39 @@ function patch_broken_eyaml {
|
||||||
next if @@plugins.include? spec
|
next if @@plugins.include? spec
|
||||||
|
|
||||||
dependency = spec.dependencies.find { |d| d.name == "hiera-eyaml" }
|
dependency = spec.dependencies.find { |d| d.name == "hiera-eyaml" }
|
||||||
|
EOF
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
#
|
||||||
|
# Ubuntu 24.04 (noble) has a hiera-eyaml version that is incompatible with ruby 3.2+ (default in ubuntu24).
|
||||||
|
# This is fixed in hiera-eyaml version 3.3.0: https://github.com/voxpupuli/hiera-eyaml/pull/340/files
|
||||||
|
# https://github.com/voxpupuli/hiera-eyaml/blob/master/CHANGELOG.md
|
||||||
|
# But there is no modern version of hiera-eyaml packaged in debian or ubuntu.
|
||||||
|
# https://github.com/puppetlabs/puppet/wiki/Puppet-8-Compatibility#filedirexists-removed
|
||||||
|
#
|
||||||
|
|
||||||
|
. /etc/os-release
|
||||||
|
if [ "${VERSION_CODENAME}" == "noble" ]; then
|
||||||
|
plugins_file="/usr/share/rubygems-integration/all/gems/hiera-eyaml-3.3.0/lib/hiera/backend/eyaml/subcommands/edit.rb"
|
||||||
|
if [ -f $plugins_file ]; then
|
||||||
|
# We only want to try patching the file if it is the known broken version
|
||||||
|
bad_sum="59c6eb910ab2eb44f8c75aeaa79bff097038feb673b5c6bdccde23d9b2a393e2"
|
||||||
|
sum=$(sha256sum $plugins_file | awk '{print $1}')
|
||||||
|
if [ "$sum" == "$bad_sum" ]; then
|
||||||
|
patch --fuzz=0 --directory=/ --strip=0 <<'EOF'
|
||||||
|
--- /usr/share/rubygems-integration/all/gems/hiera-eyaml-3.3.0/lib/hiera/backend/eyaml/subcommands/edit.rb.orig 2022-06-11 16:30:10.000000000 +0000
|
||||||
|
+++ /usr/share/rubygems-integration/all/gems/hiera-eyaml-3.3.0/lib/hiera/backend/eyaml/subcommands/edit.rb 2024-09-09 14:13:19.306342025 +0000
|
||||||
|
@@ -59,7 +59,7 @@
|
||||||
|
Optimist::die "You must specify an eyaml file" if ARGV.empty?
|
||||||
|
options[:source] = :eyaml
|
||||||
|
options[:eyaml] = ARGV.shift
|
||||||
|
- if File.exists? options[:eyaml]
|
||||||
|
+ if File.exist? options[:eyaml]
|
||||||
|
begin
|
||||||
|
options[:input_data] = File.read options[:eyaml]
|
||||||
|
rescue
|
||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
|
@ -37,3 +37,7 @@
|
||||||
'^internal-.+-test-cs-[0-9]+\.cdn\.sunet\.se$':
|
'^internal-.+-test-cs-[0-9]+\.cdn\.sunet\.se$':
|
||||||
sunet::certbot::acmed:
|
sunet::certbot::acmed:
|
||||||
sunet::certbot::sync::server:
|
sunet::certbot::sync::server:
|
||||||
|
|
||||||
|
'^internal-.+-test-db-[0-9]+\.cdn\.sunet\.se$':
|
||||||
|
sunet::dockerhost2:
|
||||||
|
cdn::db:
|
||||||
|
|
|
@ -0,0 +1,25 @@
|
||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
|
||||||
|
# shellcheck source=/dev/null
|
||||||
|
. /conf/init-cdn-db.conf
|
||||||
|
|
||||||
|
# Create database named after user, then create a schema named the same as the
|
||||||
|
# user which is also owned by that user. Because search_path (SHOW
|
||||||
|
# search_path;) starts with "$user" by default this means any tables will be
|
||||||
|
# created in that user-specific SCHEMA by default instead of falling back to
|
||||||
|
# "public". This follows the "secure schema usage pattern" summarized as
|
||||||
|
# "Constrain ordinary users to user-private schemas" from
|
||||||
|
# https://www.postgresql.org/docs/current/ddl-schemas.html#DDL-SCHEMAS-PATTERNS
|
||||||
|
#
|
||||||
|
# "In PostgreSQL 15 and later, the default configuration supports this usage
|
||||||
|
# pattern. In prior versions, or when using a database that has been upgraded
|
||||||
|
# from a prior version, you will need to remove the public CREATE privilege
|
||||||
|
# from the public schema"
|
||||||
|
psql -v ON_ERROR_STOP=1 --username "$POSTGRES_USER" --dbname "$POSTGRES_DB" <<-EOSQL
|
||||||
|
CREATE USER cdn WITH PASSWORD '${cdn_password:?}';
|
||||||
|
CREATE DATABASE cdn;
|
||||||
|
GRANT ALL PRIVILEGES ON DATABASE cdn TO cdn;
|
||||||
|
\c cdn;
|
||||||
|
CREATE SCHEMA cdn AUTHORIZATION cdn;
|
||||||
|
EOSQL
|
|
@ -13,7 +13,9 @@ pylint sunet-l4lb-namespace
|
||||||
mypy --strict sunet-l4lb-namespace
|
mypy --strict sunet-l4lb-namespace
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
import ipaddress
|
||||||
import json
|
import json
|
||||||
|
import os
|
||||||
import shlex
|
import shlex
|
||||||
import subprocess
|
import subprocess
|
||||||
import sys
|
import sys
|
||||||
|
@ -21,6 +23,7 @@ import sys
|
||||||
|
|
||||||
def run_command(cmd: str) -> subprocess.CompletedProcess[str]:
|
def run_command(cmd: str) -> subprocess.CompletedProcess[str]:
|
||||||
"""Execute subprocess command"""
|
"""Execute subprocess command"""
|
||||||
|
print(f"{cmd}")
|
||||||
args = shlex.split(cmd)
|
args = shlex.split(cmd)
|
||||||
try:
|
try:
|
||||||
proc = subprocess.run(args, capture_output=True, check=True, encoding="utf-8")
|
proc = subprocess.run(args, capture_output=True, check=True, encoding="utf-8")
|
||||||
|
@ -35,12 +38,15 @@ def run_command(cmd: str) -> subprocess.CompletedProcess[str]:
|
||||||
return proc
|
return proc
|
||||||
|
|
||||||
|
|
||||||
def configure_interfaces(
|
def configure_interfaces( # pylint: disable=too-many-locals,too-many-branches
|
||||||
namespace: str, if_data: dict[str, dict[str, list[str]]]
|
namespace: str, if_data: dict[str, dict[str, list[str]]]
|
||||||
) -> None:
|
) -> None:
|
||||||
"""Configure interfaces"""
|
"""Configure interfaces"""
|
||||||
proc = run_command("ip netns exec l4lb ip -j addr show")
|
proc = run_command(f"ip netns exec {namespace} ip -j addr show")
|
||||||
namespace_ifs = json.loads(proc.stdout)
|
namespace_ifs = json.loads(proc.stdout)
|
||||||
|
|
||||||
|
ipv4_key = "ipv4"
|
||||||
|
ipv6_key = "ipv6"
|
||||||
for if_name, data in if_data.items():
|
for if_name, data in if_data.items():
|
||||||
if_exists = next(
|
if_exists = next(
|
||||||
(True for interface in namespace_ifs if interface["ifname"] == if_name),
|
(True for interface in namespace_ifs if interface["ifname"] == if_name),
|
||||||
|
@ -54,38 +60,73 @@ def configure_interfaces(
|
||||||
else:
|
else:
|
||||||
run_command(f"ip link set {if_name} netns {namespace}")
|
run_command(f"ip link set {if_name} netns {namespace}")
|
||||||
|
|
||||||
|
run_command(f"ip netns exec {namespace} ip link set {if_name} up")
|
||||||
|
|
||||||
proc = run_command(f"ip netns exec {namespace} ip -j addr show dev {if_name}")
|
proc = run_command(f"ip netns exec {namespace} ip -j addr show dev {if_name}")
|
||||||
if_conf = json.loads(proc.stdout)
|
if_conf = json.loads(proc.stdout)
|
||||||
for ipv4_cidr in data["ipv4"]:
|
|
||||||
ip4, prefix = ipv4_cidr.split("/")
|
# Add missing addresses from config
|
||||||
v4_addr_exists = next(
|
if ipv4_key in data:
|
||||||
(
|
for configured_ipv4_cidr in data[ipv4_key]:
|
||||||
True
|
ip4, prefix = configured_ipv4_cidr.split("/")
|
||||||
for addr in if_conf[0]["addr_info"]
|
v4_addr_exists = next(
|
||||||
if addr["local"] == ip4 and addr["prefixlen"] == int(prefix)
|
(
|
||||||
),
|
True
|
||||||
False,
|
for addr in if_conf[0]["addr_info"]
|
||||||
)
|
if addr["local"] == ip4 and addr["prefixlen"] == int(prefix)
|
||||||
if not v4_addr_exists:
|
),
|
||||||
run_command(
|
False,
|
||||||
f"ip netns exec {namespace} ip addr add {ipv4_cidr} dev {if_name}"
|
|
||||||
)
|
)
|
||||||
for ipv6_cidr in data["ipv6"]:
|
if not v4_addr_exists:
|
||||||
ip6, prefix = ipv6_cidr.split("/")
|
run_command(
|
||||||
v6_addr_exists = next(
|
f"ip netns exec {namespace} ip addr add {configured_ipv4_cidr} dev {if_name}" # pylint: disable=line-too-long
|
||||||
(
|
)
|
||||||
True
|
if ipv6_key in data:
|
||||||
for addr in if_conf[0]["addr_info"]
|
for ipv6_cidr in data[ipv6_key]:
|
||||||
if addr["local"] == ip6 and addr["prefixlen"] == int(prefix)
|
ip6, prefix = ipv6_cidr.split("/")
|
||||||
),
|
v6_addr_exists = next(
|
||||||
False,
|
(
|
||||||
)
|
True
|
||||||
if not v6_addr_exists:
|
for addr in if_conf[0]["addr_info"]
|
||||||
run_command(
|
if addr["local"] == ip6 and addr["prefixlen"] == int(prefix)
|
||||||
f"ip netns exec {namespace} ip addr add {ipv6_cidr} dev {if_name}"
|
),
|
||||||
|
False,
|
||||||
|
)
|
||||||
|
if not v6_addr_exists:
|
||||||
|
run_command(
|
||||||
|
f"ip netns exec {namespace} ip addr add {ipv6_cidr} dev {if_name}"
|
||||||
|
)
|
||||||
|
|
||||||
|
# Remove no longer configured addresseses
|
||||||
|
for addr_info in if_conf[0]["addr_info"]:
|
||||||
|
# Ignore addresses like fe80
|
||||||
|
if addr_info["scope"] != "global":
|
||||||
|
continue
|
||||||
|
|
||||||
|
cidr = "/".join((addr_info["local"], str(addr_info["prefixlen"])))
|
||||||
|
|
||||||
|
# We need strict=False because otherwise ip_network() gets angry if
|
||||||
|
# there are host bits set in the address (which of course there is
|
||||||
|
# because we are parsing actual interface configs, not pure
|
||||||
|
# "networks")
|
||||||
|
cidr_net = ipaddress.ip_network(cidr, strict=False)
|
||||||
|
|
||||||
|
needs_removal = False
|
||||||
|
if cidr_net.version == 4:
|
||||||
|
if ipv4_key not in data or cidr not in data[ipv4_key]:
|
||||||
|
needs_removal = True
|
||||||
|
elif cidr_net.version == 6:
|
||||||
|
if ipv6_key not in data or cidr not in data[ipv6_key]:
|
||||||
|
needs_removal = True
|
||||||
|
else:
|
||||||
|
raise ValueError(
|
||||||
|
f"Expected IPv4 or IPv6, got something else: {cidr_net.version}"
|
||||||
)
|
)
|
||||||
|
|
||||||
run_command(f"ip netns exec {namespace} ip link set {if_name} up")
|
if needs_removal:
|
||||||
|
run_command(
|
||||||
|
f"ip netns exec {namespace} ip addr del {cidr} dev {if_name}"
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def setup_namespaces(netns_data: dict[str, dict[str, dict[str, list[str]]]]) -> None:
|
def setup_namespaces(netns_data: dict[str, dict[str, dict[str, list[str]]]]) -> None:
|
||||||
|
@ -99,8 +140,17 @@ def setup_namespaces(netns_data: dict[str, dict[str, dict[str, list[str]]]]) ->
|
||||||
if not netns_exists:
|
if not netns_exists:
|
||||||
run_command(f"ip netns add {namespace}")
|
run_command(f"ip netns add {namespace}")
|
||||||
|
|
||||||
# Make localhost available
|
# Make localhost available
|
||||||
run_command(f"ip netns exec {namespace} ip link set lo up")
|
run_command(f"ip netns exec {namespace} ip link set lo up")
|
||||||
|
|
||||||
|
# (Re)load the nft ruleset for the given namespace
|
||||||
|
nft_ruleset = f"/opt/sunet-cdn/l4lb/conf/nft-{namespace}.conf"
|
||||||
|
if os.path.isfile(nft_ruleset):
|
||||||
|
run_command(f"ip netns exec {namespace} nft -f {nft_ruleset}")
|
||||||
|
else:
|
||||||
|
print(
|
||||||
|
f"WARNING: no nft ruleset found for namespace '{namespace}' ({nft_ruleset}), the namespace will not be firewalled" # pylint: disable=line-too-long
|
||||||
|
)
|
||||||
|
|
||||||
configure_interfaces(namespace, if_data)
|
configure_interfaces(namespace, if_data)
|
||||||
|
|
||||||
|
@ -129,10 +179,30 @@ def main() -> None:
|
||||||
# }
|
# }
|
||||||
# }
|
# }
|
||||||
# }
|
# }
|
||||||
with open("/opt/sunet-cdn/l4lb/conf/netns.json", encoding="utf-8") as f:
|
|
||||||
netns_data = json.load(f)
|
|
||||||
|
|
||||||
setup_namespaces(netns_data)
|
input_files = [
|
||||||
|
"/opt/sunet-cdn/l4lb/conf/netns-base.json",
|
||||||
|
"/opt/sunet-cdn/l4lb/conf/netns-sunet-cdn-agent.json",
|
||||||
|
]
|
||||||
|
|
||||||
|
merged_netns_data: dict[str, dict[str, dict[str, list[str]]]] = {}
|
||||||
|
for input_file in input_files:
|
||||||
|
try:
|
||||||
|
with open(input_file, encoding="utf-8") as f:
|
||||||
|
netns_data = json.load(f)
|
||||||
|
|
||||||
|
# Combine interface config from multiple files belonging to the same namespace
|
||||||
|
for ns, ns_data in netns_data.items():
|
||||||
|
if ns in merged_netns_data:
|
||||||
|
merged_netns_data[ns].update(ns_data)
|
||||||
|
else:
|
||||||
|
merged_netns_data[ns] = ns_data
|
||||||
|
|
||||||
|
except FileNotFoundError:
|
||||||
|
print(f"skipping nonexistant file '{input_file}'")
|
||||||
|
continue
|
||||||
|
|
||||||
|
setup_namespaces(merged_netns_data)
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
|
|
|
@ -3,12 +3,18 @@ class cdn::cache(
|
||||||
Hash[String, Integer] $customers = {
|
Hash[String, Integer] $customers = {
|
||||||
customer1 => 1000000000,
|
customer1 => 1000000000,
|
||||||
},
|
},
|
||||||
String $sunet_cdnp_version = '0.0.2',
|
String $sunet_cdnp_version = '0.0.7',
|
||||||
Hash[String, String] $acme_url = {
|
Hash[String, String] $acme_url = {
|
||||||
test => 'https://internal-sto3-test-ca-1.cdn.sunet.se:9000/acme/acme/directory'
|
test => 'https://internal-sto3-test-ca-1.cdn.sunet.se:9000/acme/acme/directory'
|
||||||
}
|
},
|
||||||
|
Hash[String, Hash[String, String]] $mqtt_url = {
|
||||||
|
sto3 => {
|
||||||
|
test => 'tls://internal-sto3-test-mqtt-1.cdn.sunet.se:8883',
|
||||||
|
},
|
||||||
|
},
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
|
include sunet::systemd_reload
|
||||||
include sunet::packages::certbot
|
include sunet::packages::certbot
|
||||||
include cdn::ca_trust
|
include cdn::ca_trust
|
||||||
|
|
||||||
|
@ -135,6 +141,7 @@ class cdn::cache(
|
||||||
$dot_split = split($my_fqdn, '[.]')
|
$dot_split = split($my_fqdn, '[.]')
|
||||||
$my_hostname = $dot_split[0]
|
$my_hostname = $dot_split[0]
|
||||||
$dash_split = split($my_hostname,'[-]')
|
$dash_split = split($my_hostname,'[-]')
|
||||||
|
$location = $dash_split[1]
|
||||||
$environment = $dash_split[2]
|
$environment = $dash_split[2]
|
||||||
|
|
||||||
sunet::nftables::allow { 'allow-step-ca-acme':
|
sunet::nftables::allow { 'allow-step-ca-acme':
|
||||||
|
@ -169,6 +176,7 @@ class cdn::cache(
|
||||||
command => "tar -xzf ${sunet_cdnp_file} sunet-cdnp",
|
command => "tar -xzf ${sunet_cdnp_file} sunet-cdnp",
|
||||||
cwd => $sunet_cdnp_dir,
|
cwd => $sunet_cdnp_dir,
|
||||||
refreshonly => true,
|
refreshonly => true,
|
||||||
|
notify => Service['sunet-cdnp'],
|
||||||
}
|
}
|
||||||
|
|
||||||
file { "${sunet_cdnp_dir}/sunet-cdnp":
|
file { "${sunet_cdnp_dir}/sunet-cdnp":
|
||||||
|
@ -182,6 +190,20 @@ class cdn::cache(
|
||||||
target => "${sunet_cdnp_dir}/sunet-cdnp",
|
target => "${sunet_cdnp_dir}/sunet-cdnp",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
file { '/etc/systemd/system/sunet-cdnp.service':
|
||||||
|
ensure => file,
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root',
|
||||||
|
mode => '0644',
|
||||||
|
content => template('cdn/cache/sunet-cdnp.service.erb'),
|
||||||
|
notify => [Class['sunet::systemd_reload']],
|
||||||
|
}
|
||||||
|
|
||||||
|
service { 'sunet-cdnp':
|
||||||
|
ensure => 'running',
|
||||||
|
enable => true,
|
||||||
|
}
|
||||||
|
|
||||||
if $cache_secrets {
|
if $cache_secrets {
|
||||||
$customers.each |String $customer, Integer $customer_uid| {
|
$customers.each |String $customer, Integer $customer_uid| {
|
||||||
if $cache_secrets['customers'][$customer] {
|
if $cache_secrets['customers'][$customer] {
|
||||||
|
|
76
global/overlay/etc/puppet/modules/cdn/manifests/db.pp
Normal file
76
global/overlay/etc/puppet/modules/cdn/manifests/db.pp
Normal file
|
@ -0,0 +1,76 @@
|
||||||
|
# Configure a SUNET CDN DB server
|
||||||
|
class cdn::db(
|
||||||
|
String $postgres_version = '17.0-bookworm',
|
||||||
|
)
|
||||||
|
{
|
||||||
|
|
||||||
|
$db_secrets = lookup({ 'name' => 'cdn::db-secrets', 'default_value' => undef })
|
||||||
|
|
||||||
|
if $db_secrets {
|
||||||
|
file { '/opt/sunet-cdn':
|
||||||
|
ensure => directory,
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root',
|
||||||
|
mode => '0755',
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/opt/sunet-cdn/compose':
|
||||||
|
ensure => directory,
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root',
|
||||||
|
mode => '0750',
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/opt/sunet-cdn/db':
|
||||||
|
ensure => directory,
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root',
|
||||||
|
mode => '0750',
|
||||||
|
}
|
||||||
|
|
||||||
|
# User/group 999 matches postgres user in container
|
||||||
|
file { '/opt/sunet-cdn/db/conf':
|
||||||
|
ensure => directory,
|
||||||
|
owner => '999',
|
||||||
|
group => '999',
|
||||||
|
mode => '0750',
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/opt/sunet-cdn/db/docker-entrypoint-initdb.d':
|
||||||
|
ensure => directory,
|
||||||
|
owner => '999',
|
||||||
|
group => '999',
|
||||||
|
mode => '0750',
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/opt/sunet-cdn/db/conf/init-cdn-db.conf':
|
||||||
|
ensure => file,
|
||||||
|
owner => '999',
|
||||||
|
group => '999',
|
||||||
|
mode => '0640',
|
||||||
|
content => template('cdn/db/init-cdn-db.conf.erb'),
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/opt/sunet-cdn/db/docker-entrypoint-initdb.d/init-cdn-db.sh':
|
||||||
|
ensure => file,
|
||||||
|
owner => '999',
|
||||||
|
group => '999',
|
||||||
|
mode => '0750',
|
||||||
|
content => file('cdn/db/init-cdn-db.sh'),
|
||||||
|
}
|
||||||
|
|
||||||
|
sunet::nftables::docker_expose { 'postgres-db' :
|
||||||
|
allow_clients => '127.0.0.1',
|
||||||
|
port => 5432,
|
||||||
|
iif => $facts['networking']['primary'],
|
||||||
|
}
|
||||||
|
|
||||||
|
sunet::docker_compose { 'sunet-cdn-db':
|
||||||
|
content => template('cdn/db/docker-compose.yml.erb'),
|
||||||
|
service_name => 'cdn-db',
|
||||||
|
compose_dir => '/opt/sunet-cdn/compose',
|
||||||
|
compose_filename => 'docker-compose.yml',
|
||||||
|
description => 'SUNET CDN DB',
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -17,6 +17,8 @@ class cdn::l4lb(
|
||||||
|
|
||||||
include sunet::systemd_reload
|
include sunet::systemd_reload
|
||||||
|
|
||||||
|
package {'conntrack': ensure => installed }
|
||||||
|
|
||||||
package {'bird2': ensure => installed }
|
package {'bird2': ensure => installed }
|
||||||
|
|
||||||
file { '/opt/sunet-cdn':
|
file { '/opt/sunet-cdn':
|
||||||
|
@ -54,12 +56,20 @@ class cdn::l4lb(
|
||||||
mode => '0640',
|
mode => '0640',
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/opt/sunet-cdn/l4lb/conf/netns.json':
|
file { '/opt/sunet-cdn/l4lb/conf/netns-base.json':
|
||||||
ensure => file,
|
ensure => file,
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
group => 'root',
|
group => 'root',
|
||||||
mode => '0644',
|
mode => '0644',
|
||||||
content => template('cdn/l4lb/netns.json.erb'),
|
content => template('cdn/l4lb/netns-base.json.erb'),
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/opt/sunet-cdn/l4lb/conf/nft-l4lb.conf':
|
||||||
|
ensure => file,
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root',
|
||||||
|
mode => '0644',
|
||||||
|
content => template('cdn/l4lb/nft-l4lb.conf.erb'),
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/usr/local/bin/sunet-l4lb-namespace':
|
file { '/usr/local/bin/sunet-l4lb-namespace':
|
||||||
|
|
16
global/overlay/etc/puppet/modules/cdn/templates/cache/sunet-cdnp.service.erb
vendored
Normal file
16
global/overlay/etc/puppet/modules/cdn/templates/cache/sunet-cdnp.service.erb
vendored
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
# This service file is generated by Puppet. Do not edit.
|
||||||
|
[Unit]
|
||||||
|
Description=SUNET CDN Purger
|
||||||
|
Wants=docker.service
|
||||||
|
After=docker.service
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
ExecStart=/usr/local/bin/sunet-cdnp \
|
||||||
|
-mqtt-ca-file /usr/local/share/ca-certificates/step_ca_root.crt \
|
||||||
|
-mqtt-client-key-file /etc/letsencrypt/live/<%= @networking['fqdn'] %>/privkey.pem \
|
||||||
|
-mqtt-client-cert-file /etc/letsencrypt/live/<%= @networking['fqdn'] %>/fullchain.pem \
|
||||||
|
-mqtt-server <%= @mqtt_url[@location][@environment] %>
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
|
@ -0,0 +1,13 @@
|
||||||
|
services:
|
||||||
|
db:
|
||||||
|
image: "postgres:<%= @postgres_version %>"
|
||||||
|
environment:
|
||||||
|
- POSTGRES_PASSWORD=<%= @db_secrets['postgres_password'] %>
|
||||||
|
ports:
|
||||||
|
- "5432:5432"
|
||||||
|
volumes:
|
||||||
|
- postgres_data:/var/lib/postgresql/data
|
||||||
|
- /opt/sunet-cdn/db/docker-entrypoint-initdb.d:/docker-entrypoint-initdb.d
|
||||||
|
- /opt/sunet-cdn/db/conf:/conf
|
||||||
|
volumes:
|
||||||
|
postgres_data:
|
|
@ -0,0 +1,2 @@
|
||||||
|
# File sourced by init-cdn-db.sh
|
||||||
|
cdn_password="<%= @db_secrets['cdn_password'] %>"
|
|
@ -15,14 +15,6 @@
|
||||||
"ipv6": [
|
"ipv6": [
|
||||||
"2001:6b0:2006:75::1/127"
|
"2001:6b0:2006:75::1/127"
|
||||||
]
|
]
|
||||||
},
|
|
||||||
"dummy0": {
|
|
||||||
"ipv4": [
|
|
||||||
"188.240.152.1/32"
|
|
||||||
],
|
|
||||||
"ipv6": [
|
|
||||||
"2001:6b0:2100::1/128"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
|
@ -0,0 +1,40 @@
|
||||||
|
#!/usr/sbin/nft -f
|
||||||
|
|
||||||
|
flush ruleset
|
||||||
|
|
||||||
|
table inet filter {
|
||||||
|
chain input {
|
||||||
|
type filter hook input priority 0; policy drop;
|
||||||
|
|
||||||
|
# accept any localhost traffic
|
||||||
|
iif lo counter accept
|
||||||
|
|
||||||
|
# accept icmp
|
||||||
|
ip protocol icmp counter accept
|
||||||
|
ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, packet-too-big, time-exceeded,
|
||||||
|
parameter-problem, echo-request, mld-listener-query,
|
||||||
|
nd-router-solicit, nd-router-advert, nd-neighbor-solicit,
|
||||||
|
nd-neighbor-advert } counter accept
|
||||||
|
|
||||||
|
# accept traffic originated from us
|
||||||
|
ct state established counter accept
|
||||||
|
# silently drop invalid packets
|
||||||
|
ct state invalid counter drop
|
||||||
|
}
|
||||||
|
chain forward {
|
||||||
|
type filter hook forward priority 0; policy drop;
|
||||||
|
}
|
||||||
|
chain output {
|
||||||
|
type filter hook output priority 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# HTTP and HTTPS
|
||||||
|
add rule inet filter input tcp dport 80 counter accept comment "l4lb HTTP"
|
||||||
|
add rule inet filter input tcp dport 443 counter accept comment "l4lb HTTPS"
|
||||||
|
|
||||||
|
# BGP
|
||||||
|
add rule inet filter input ip saddr { 130.242.64.232 } tcp dport 179 counter accept comment "tug-r11-v4"
|
||||||
|
add rule inet filter input ip saddr { 130.242.64.234 } tcp dport 179 counter accept comment "tug-r12-v4"
|
||||||
|
add rule inet filter input ip6 saddr { 2001:6b0:2006:74:: } tcp dport 179 counter accept comment "tug-r11-v6"
|
||||||
|
add rule inet filter input ip6 saddr { 2001:6b0:2006:75:: } tcp dport 179 counter accept comment "tug-r12-v6"
|
|
@ -83,7 +83,7 @@ def main():
|
||||||
"sunet": {
|
"sunet": {
|
||||||
"repo": "https://github.com/SUNET/puppet-sunet.git",
|
"repo": "https://github.com/SUNET/puppet-sunet.git",
|
||||||
"upgrade": "yes",
|
"upgrade": "yes",
|
||||||
"tag": "stable-2023v1-2*",
|
"tag": "patlu-dockerhost2-ipv6-nat-2*",
|
||||||
},
|
},
|
||||||
"augeas": {
|
"augeas": {
|
||||||
"repo": "https://github.com/SUNET/puppet-augeas.git",
|
"repo": "https://github.com/SUNET/puppet-augeas.git",
|
||||||
|
|
|
@ -8,7 +8,7 @@ set -e
|
||||||
stamp="$COSMOS_BASE/stamps/common-tools-v01.stamp"
|
stamp="$COSMOS_BASE/stamps/common-tools-v01.stamp"
|
||||||
|
|
||||||
if ! test -f $stamp; then
|
if ! test -f $stamp; then
|
||||||
apt-get -y install vim traceroute tcpdump molly-guard less rsync git-core unattended-upgrades ntp
|
apt-get -y install vim traceroute tcpdump molly-guard less rsync git-core unattended-upgrades
|
||||||
update-alternatives --set editor /usr/bin/vim.basic
|
update-alternatives --set editor /usr/bin/vim.basic
|
||||||
|
|
||||||
mkdir -p `dirname $stamp`
|
mkdir -p `dirname $stamp`
|
||||||
|
|
3
internal-sto3-test-db-1.cdn.sunet.se/README
Normal file
3
internal-sto3-test-db-1.cdn.sunet.se/README
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
|
||||||
|
The system documentation is in the docs directory of the multiverse repository.
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
---
|
||||||
|
cdn::db-secrets:
|
||||||
|
postgres_password: ENC[PKCS7,MIIDCAYJKoZIhvcNAQcDoIIC+TCCAvUCAQAxggKQMIICjAIBADB0MFwxCzAJBgNVBAYTAlNFMQ4wDAYDVQQKDAVTVU5FVDEOMAwGA1UECwwFRVlBTUwxLTArBgNVBAMMJGludGVybmFsLXN0bzMtdGVzdC1kYi0xLmNkbi5zdW5ldC5zZQIUbbUXduFvDLw3OUVWiGrIvFBkkJMwDQYJKoZIhvcNAQEBBQAEggIAGKLk12OT5zsVKd04qsLkFtawdauLYUERXUC3d9FtZNVpwCFDNMnSsruUfasOvyvdaRbm8AUk/nAGuBNjD9HJj8J45KfQUEAPstnZPHndkF51LwU1twFrZvcSnvFANvxh61MzccMz6NVQL5CXsw4IWMDNhUbkhO5cRfxc0SOVugeTZ74BWwpEww9uKVPtfPRKCgJayBq1o/fyQblGsjJbmu/dRCm32gcdZu1lqfDU0DLsnjk14GJpqpP5h6sEfSrdXyFcWzFzdjtLZLL6TfUWYNYX6CnjjRMv1zZ73877DPXt+vvi0Nvqld5CDTXM9ggDWwZKvluVGn7sTyZdwtWLvs1qK4nui7NLfENtBrUi/GOWsxoFa9tmfeeX/cticzzQcUdDNkfaDgmBa/C7lyjlkwyDGvhYdBHycSEJJ8rxncjBGKl79mpWlK0YTsppgD5eXWZSK7gC3PecRqQ7Jri3aBAWymlM7wfJYP8Z5ocEEq7+BLKSk0Z+Npj8PqJkQ0mw96QC5kNY2LfnGTPbBPpyBZRfZh3F2x1fLN+JQN+IgMpzLW2Oce5HWlPn9iTgCiZU/7mRDJKe8wI4gSg+Mf6hWqlC+NIcMOdAcrfvobzx3PVDHletTd0xgdgGEJpOvtpkYCqcdDbFX4kyEntMaMmp32XBcgsUy1b09uHMB2klzncwXAYJKoZIhvcNAQcBMB0GCWCGSAFlAwQBKgQQereGW4ZbKx3BV6f/PqkgSYAwcqDeq645K3JJOx9su/j9qDcAGxJN1CqIJjkYFBI+/2euykTaCvIqUMhljoDjeJeE]
|
||||||
|
cdn_password: ENC[PKCS7,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]
|
Loading…
Add table
Reference in a new issue