Compare commits
No commits in common. "main" and "cdn-ops-2025-03-30-v01" have entirely different histories.
main
...
cdn-ops-20
3 changed files with 1 additions and 69 deletions
|
@ -15,7 +15,6 @@ mypy --strict sunet-l4lb-namespace
|
||||||
|
|
||||||
import ipaddress
|
import ipaddress
|
||||||
import json
|
import json
|
||||||
import os
|
|
||||||
import shlex
|
import shlex
|
||||||
import subprocess
|
import subprocess
|
||||||
import sys
|
import sys
|
||||||
|
@ -143,15 +142,6 @@ def setup_namespaces(netns_data: dict[str, dict[str, dict[str, list[str]]]]) ->
|
||||||
# Make localhost available
|
# Make localhost available
|
||||||
run_command(f"ip netns exec {namespace} ip link set lo up")
|
run_command(f"ip netns exec {namespace} ip link set lo up")
|
||||||
|
|
||||||
# (Re)load the nft ruleset for the given namespace
|
|
||||||
nft_ruleset = f"/opt/sunet-cdn/l4lb/conf/nft-{namespace}.conf"
|
|
||||||
if os.path.isfile(nft_ruleset):
|
|
||||||
run_command(f"ip netns exec {namespace} nft -f {nft_ruleset}")
|
|
||||||
else:
|
|
||||||
print(
|
|
||||||
f"WARNING: no nft ruleset found for namespace '{namespace}' ({nft_ruleset}), the namespace will not be firewalled" # pylint: disable=line-too-long
|
|
||||||
)
|
|
||||||
|
|
||||||
configure_interfaces(namespace, if_data)
|
configure_interfaces(namespace, if_data)
|
||||||
|
|
||||||
|
|
||||||
|
@ -185,24 +175,14 @@ def main() -> None:
|
||||||
"/opt/sunet-cdn/l4lb/conf/netns-sunet-cdn-agent.json",
|
"/opt/sunet-cdn/l4lb/conf/netns-sunet-cdn-agent.json",
|
||||||
]
|
]
|
||||||
|
|
||||||
merged_netns_data: dict[str, dict[str, dict[str, list[str]]]] = {}
|
|
||||||
for input_file in input_files:
|
for input_file in input_files:
|
||||||
try:
|
try:
|
||||||
with open(input_file, encoding="utf-8") as f:
|
with open(input_file, encoding="utf-8") as f:
|
||||||
netns_data = json.load(f)
|
netns_data = json.load(f)
|
||||||
|
|
||||||
# Combine interface config from multiple files belonging to the same namespace
|
|
||||||
for ns, ns_data in netns_data.items():
|
|
||||||
if ns in merged_netns_data:
|
|
||||||
merged_netns_data[ns].update(ns_data)
|
|
||||||
else:
|
|
||||||
merged_netns_data[ns] = ns_data
|
|
||||||
|
|
||||||
except FileNotFoundError:
|
except FileNotFoundError:
|
||||||
print(f"skipping nonexistant file '{input_file}'")
|
print(f"skipping nonexistant file '{input_file}'")
|
||||||
continue
|
continue
|
||||||
|
setup_namespaces(netns_data)
|
||||||
setup_namespaces(merged_netns_data)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
|
|
|
@ -64,14 +64,6 @@ class cdn::l4lb(
|
||||||
content => template('cdn/l4lb/netns-base.json.erb'),
|
content => template('cdn/l4lb/netns-base.json.erb'),
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/opt/sunet-cdn/l4lb/conf/nft-l4lb.conf':
|
|
||||||
ensure => file,
|
|
||||||
owner => 'root',
|
|
||||||
group => 'root',
|
|
||||||
mode => '0644',
|
|
||||||
content => template('cdn/l4lb/nft-l4lb.conf.erb'),
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/usr/local/bin/sunet-l4lb-namespace':
|
file { '/usr/local/bin/sunet-l4lb-namespace':
|
||||||
ensure => file,
|
ensure => file,
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
|
|
|
@ -1,40 +0,0 @@
|
||||||
#!/usr/sbin/nft -f
|
|
||||||
|
|
||||||
flush ruleset
|
|
||||||
|
|
||||||
table inet filter {
|
|
||||||
chain input {
|
|
||||||
type filter hook input priority 0; policy drop;
|
|
||||||
|
|
||||||
# accept any localhost traffic
|
|
||||||
iif lo counter accept
|
|
||||||
|
|
||||||
# accept icmp
|
|
||||||
ip protocol icmp counter accept
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, packet-too-big, time-exceeded,
|
|
||||||
parameter-problem, echo-request, mld-listener-query,
|
|
||||||
nd-router-solicit, nd-router-advert, nd-neighbor-solicit,
|
|
||||||
nd-neighbor-advert } counter accept
|
|
||||||
|
|
||||||
# accept traffic originated from us
|
|
||||||
ct state established counter accept
|
|
||||||
# silently drop invalid packets
|
|
||||||
ct state invalid counter drop
|
|
||||||
}
|
|
||||||
chain forward {
|
|
||||||
type filter hook forward priority 0; policy drop;
|
|
||||||
}
|
|
||||||
chain output {
|
|
||||||
type filter hook output priority 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# HTTP and HTTPS
|
|
||||||
add rule inet filter input tcp dport 80 counter accept comment "l4lb HTTP"
|
|
||||||
add rule inet filter input tcp dport 443 counter accept comment "l4lb HTTPS"
|
|
||||||
|
|
||||||
# BGP
|
|
||||||
add rule inet filter input ip saddr { 130.242.64.232 } tcp dport 179 counter accept comment "tug-r11-v4"
|
|
||||||
add rule inet filter input ip saddr { 130.242.64.234 } tcp dport 179 counter accept comment "tug-r12-v4"
|
|
||||||
add rule inet filter input ip6 saddr { 2001:6b0:2006:74:: } tcp dport 179 counter accept comment "tug-r11-v6"
|
|
||||||
add rule inet filter input ip6 saddr { 2001:6b0:2006:75:: } tcp dport 179 counter accept comment "tug-r12-v6"
|
|
Loading…
Add table
Reference in a new issue