resource_name :firewall_rule
provides :firewall_rule
+unified_mode true
+
default_action :nothing
property :rule, :kind_of => String, :name_property => true
property :dest_ports, :kind_of => [String, Integer], :default => "-"
property :source_ports, :kind_of => [String, Integer], :default => "-"
property :rate_limit, :kind_of => String, :default => "-"
-property :connection_limit, :kind_of => String, :default => "-"
+property :connection_limit, :kind_of => [String, Integer], :default => "-"
property :helper, :kind_of => String, :default => "-"
+property :compile_time, TrueClass, :default => true
+
action :accept do
add_rule :accept
end
action_class do
def add_rule(action)
+ if node[:networking][:firewall][:engine] == "shorewall"
+ add_shorewall_rule(action)
+ elsif node[:networking][:firewall][:engine] == "nftables"
+ if new_resource.family.nil?
+ add_nftables_rule(action, "inet")
+ add_nftables_rule(action, "inet6")
+ elsif new_resource.family.to_s == "inet"
+ add_nftables_rule(action, "inet")
+ elsif new_resource.family.to_s == "inet6"
+ add_nftables_rule(action, "inet6")
+ end
+ end
+ end
+
+ def add_shorewall_rule(action)
rule = {
:action => action.to_s.upcase,
:source => new_resource.source,
:dest_ports => new_resource.dest_ports.to_s,
:source_ports => new_resource.source_ports.to_s,
:rate_limit => new_resource.rate_limit,
- :connection_limit => new_resource.connection_limit,
+ :connection_limit => new_resource.connection_limit.to_s,
:helper => new_resource.helper
}
end
end
end
+
+ def add_nftables_rule(action, family)
+ rule = []
+
+ ip = case family
+ when "inet" then "ip"
+ when "inet6" then "ip6"
+ end
+
+ proto = case new_resource.proto
+ when "udp" then "udp"
+ when "tcp", "tcp:syn" then "tcp"
+ end
+
+ if new_resource.source_ports != "-"
+ rule << "#{proto} sport { #{nftables_source_ports} }"
+ end
+
+ if new_resource.dest_ports != "-"
+ rule << "#{proto} dport { #{nftables_dest_ports} }"
+ end
+
+ if new_resource.source == "osm"
+ rule << "#{ip} saddr @#{ip}-osm-addresses"
+ elsif new_resource.source =~ /^net:(.*)$/
+ addresses = Regexp.last_match(1).split(",").join(", ")
+
+ rule << "#{ip} saddr { #{addresses} }"
+ end
+
+ if new_resource.dest == "osm"
+ rule << "#{ip} daddr @#{ip}-osm-addresses"
+ elsif new_resource.dest =~ /^net:(.*)$/
+ addresses = Regexp.last_match(1).split(",").join(", ")
+
+ rule << "#{ip} daddr { #{addresses} }"
+ end
+
+ if new_resource.proto == "tcp:syn"
+ rule << "ct state new"
+ end
+
+ if new_resource.connection_limit != "-"
+ set = "connlimit-#{new_resource.rule}-#{ip}"
+
+ node.default[:networking][:firewall][:sets] << set
+
+ rule << "add @#{set} { #{ip} saddr ct count #{new_resource.connection_limit} }"
+ end
+
+ if new_resource.rate_limit =~ %r{^s:(\d+)/sec:(\d+)$}
+ set = "ratelimit-#{new_resource.rule}-#{ip}"
+ rate = Regexp.last_match(1)
+ burst = Regexp.last_match(2)
+
+ node.default[:networking][:firewall][:sets] << set
+
+ rule << "update @#{set} { #{ip} saddr limit rate #{rate}/second burst #{burst} packets }"
+ end
+
+ rule << case action
+ when :accept then "accept"
+ when :drop then "jump log-and-drop"
+ when :reject then "jump log-and-reject"
+ end
+
+ if new_resource.source == "fw"
+ node.default[:networking][:firewall][:outgoing] << rule.join(" ")
+ elsif new_resource.dest == "fw"
+ node.default[:networking][:firewall][:incoming] << rule.join(" ")
+ end
+ end
+
+ def nftables_source_ports
+ new_resource.source_ports.to_s.sub(/:$/, "-65535").gsub(":", "-")
+ end
+
+ def nftables_dest_ports
+ new_resource.dest_ports.to_s.sub(/:$/, "-65535").gsub(":", "-")
+ end
end