Compare commits
3 commits
cdn-ops-20
...
main
Author | SHA1 | Date | |
---|---|---|---|
5489eeeb7a | |||
39e1db9c32 | |||
f7dd464ed7 |
3 changed files with 71 additions and 1 deletions
|
@ -15,6 +15,7 @@ mypy --strict sunet-l4lb-namespace
|
||||||
|
|
||||||
import ipaddress
|
import ipaddress
|
||||||
import json
|
import json
|
||||||
|
import os
|
||||||
import shlex
|
import shlex
|
||||||
import subprocess
|
import subprocess
|
||||||
import sys
|
import sys
|
||||||
|
@ -142,6 +143,15 @@ def setup_namespaces(netns_data: dict[str, dict[str, dict[str, list[str]]]]) ->
|
||||||
# Make localhost available
|
# Make localhost available
|
||||||
run_command(f"ip netns exec {namespace} ip link set lo up")
|
run_command(f"ip netns exec {namespace} ip link set lo up")
|
||||||
|
|
||||||
|
# (Re)load the nft ruleset for the given namespace
|
||||||
|
nft_ruleset = f"/opt/sunet-cdn/l4lb/conf/nft-{namespace}.conf"
|
||||||
|
if os.path.isfile(nft_ruleset):
|
||||||
|
run_command(f"ip netns exec {namespace} nft -f {nft_ruleset}")
|
||||||
|
else:
|
||||||
|
print(
|
||||||
|
f"WARNING: no nft ruleset found for namespace '{namespace}' ({nft_ruleset}), the namespace will not be firewalled" # pylint: disable=line-too-long
|
||||||
|
)
|
||||||
|
|
||||||
configure_interfaces(namespace, if_data)
|
configure_interfaces(namespace, if_data)
|
||||||
|
|
||||||
|
|
||||||
|
@ -175,14 +185,24 @@ def main() -> None:
|
||||||
"/opt/sunet-cdn/l4lb/conf/netns-sunet-cdn-agent.json",
|
"/opt/sunet-cdn/l4lb/conf/netns-sunet-cdn-agent.json",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
merged_netns_data: dict[str, dict[str, dict[str, list[str]]]] = {}
|
||||||
for input_file in input_files:
|
for input_file in input_files:
|
||||||
try:
|
try:
|
||||||
with open(input_file, encoding="utf-8") as f:
|
with open(input_file, encoding="utf-8") as f:
|
||||||
netns_data = json.load(f)
|
netns_data = json.load(f)
|
||||||
|
|
||||||
|
# Combine interface config from multiple files belonging to the same namespace
|
||||||
|
for ns, ns_data in netns_data.items():
|
||||||
|
if ns in merged_netns_data:
|
||||||
|
merged_netns_data[ns].update(ns_data)
|
||||||
|
else:
|
||||||
|
merged_netns_data[ns] = ns_data
|
||||||
|
|
||||||
except FileNotFoundError:
|
except FileNotFoundError:
|
||||||
print(f"skipping nonexistant file '{input_file}'")
|
print(f"skipping nonexistant file '{input_file}'")
|
||||||
continue
|
continue
|
||||||
setup_namespaces(netns_data)
|
|
||||||
|
setup_namespaces(merged_netns_data)
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
|
|
|
@ -17,6 +17,8 @@ class cdn::l4lb(
|
||||||
|
|
||||||
include sunet::systemd_reload
|
include sunet::systemd_reload
|
||||||
|
|
||||||
|
package {'conntrack': ensure => installed }
|
||||||
|
|
||||||
package {'bird2': ensure => installed }
|
package {'bird2': ensure => installed }
|
||||||
|
|
||||||
file { '/opt/sunet-cdn':
|
file { '/opt/sunet-cdn':
|
||||||
|
@ -62,6 +64,14 @@ class cdn::l4lb(
|
||||||
content => template('cdn/l4lb/netns-base.json.erb'),
|
content => template('cdn/l4lb/netns-base.json.erb'),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
file { '/opt/sunet-cdn/l4lb/conf/nft-l4lb.conf':
|
||||||
|
ensure => file,
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root',
|
||||||
|
mode => '0644',
|
||||||
|
content => template('cdn/l4lb/nft-l4lb.conf.erb'),
|
||||||
|
}
|
||||||
|
|
||||||
file { '/usr/local/bin/sunet-l4lb-namespace':
|
file { '/usr/local/bin/sunet-l4lb-namespace':
|
||||||
ensure => file,
|
ensure => file,
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
|
|
|
@ -0,0 +1,40 @@
|
||||||
|
#!/usr/sbin/nft -f
|
||||||
|
|
||||||
|
flush ruleset
|
||||||
|
|
||||||
|
table inet filter {
|
||||||
|
chain input {
|
||||||
|
type filter hook input priority 0; policy drop;
|
||||||
|
|
||||||
|
# accept any localhost traffic
|
||||||
|
iif lo counter accept
|
||||||
|
|
||||||
|
# accept icmp
|
||||||
|
ip protocol icmp counter accept
|
||||||
|
ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, packet-too-big, time-exceeded,
|
||||||
|
parameter-problem, echo-request, mld-listener-query,
|
||||||
|
nd-router-solicit, nd-router-advert, nd-neighbor-solicit,
|
||||||
|
nd-neighbor-advert } counter accept
|
||||||
|
|
||||||
|
# accept traffic originated from us
|
||||||
|
ct state established counter accept
|
||||||
|
# silently drop invalid packets
|
||||||
|
ct state invalid counter drop
|
||||||
|
}
|
||||||
|
chain forward {
|
||||||
|
type filter hook forward priority 0; policy drop;
|
||||||
|
}
|
||||||
|
chain output {
|
||||||
|
type filter hook output priority 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# HTTP and HTTPS
|
||||||
|
add rule inet filter input tcp dport 80 counter accept comment "l4lb HTTP"
|
||||||
|
add rule inet filter input tcp dport 443 counter accept comment "l4lb HTTPS"
|
||||||
|
|
||||||
|
# BGP
|
||||||
|
add rule inet filter input ip saddr { 130.242.64.232 } tcp dport 179 counter accept comment "tug-r11-v4"
|
||||||
|
add rule inet filter input ip saddr { 130.242.64.234 } tcp dport 179 counter accept comment "tug-r12-v4"
|
||||||
|
add rule inet filter input ip6 saddr { 2001:6b0:2006:74:: } tcp dport 179 counter accept comment "tug-r11-v6"
|
||||||
|
add rule inet filter input ip6 saddr { 2001:6b0:2006:75:: } tcp dport 179 counter accept comment "tug-r12-v6"
|
Loading…
Add table
Reference in a new issue