File: firewallchain.rb

package info (click to toggle)
puppet-module-puppetlabs-firewall 8.1.7-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 512 kB
  • sloc: ruby: 2,674; sh: 39; makefile: 2
file content (91 lines) | stat: -rw-r--r-- 3,395 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
# frozen_string_literal: true

# lib/puppet/type/firewallchain.rb
require 'puppet/resource_api'

Puppet::ResourceApi.register_type(
  name: 'firewallchain',
  features: ['custom_generate', 'custom_insync'],
  docs: <<-DESC,
    This type provides the capability to manage rule chains for firewalls.

  Currently this supports only iptables, ip6tables and ebtables on Linux. And
  provides support for setting the default policy on chains and tables that
  allow it.

  #### Providers
    * iptables_chain is the only provider that supports firewallchain.

  #### Features
    * iptables_chain: The provider provides iptables chain features.
    * policy: Default policy (inbuilt chains only).
  DESC
  attributes: {
    ensure: {
      type: 'Enum[present, absent]',
      default: 'present',
      desc: <<-DESC
      Whether this chain should be present or absent on the target system.
      Setting this to absent will first remove all rules associated with this chain and then delete the chain itself.
      Inbuilt chains however will merely remove any added rules and, if it has been changed, return their policy to the default.
      DESC
    },
    name: {
      type: 'Pattern[/^(?:\S+):(?:nat|mangle|filter|raw|rawpost|broute|security):(?:IP(?:v[46])?|ethernet)$/]',
      desc: 'The canonical name of the chain with the required format being `{chain}:{table}:{protocol}`.',
      behaviour: :namevar
    },
    policy: {
      type: "Optional[Enum['accept', 'drop', 'queue', 'return']]",
      desc: <<-DESC
      This action to take when the end of the chain is reached.
      This can only be set on inbuilt chains (i.e. INPUT, FORWARD, OUTPUT,
      PREROUTING, POSTROUTING) and can be one of:

      * accept - the packet is accepted
      * drop - the packet is dropped
      * queue - the packet is passed userspace
      * return - the packet is returned to calling (jump) queue
                 or the default of inbuilt chains
      DESC
    },
    purge: {
      type: 'Boolean',
      default: false,
      desc: 'Whether or not to purge unmanaged rules in this chain'
    },
    ignore: {
      type: 'Optional[Variant[String[1], Array[String[1]]]]',
      desc: <<-DESC
      Regex to perform on firewall rules to exempt unmanaged rules from purging.
      This is matched against the output of `iptables-save`.

      This can be a single regex, or an array of them.
      To support flags, use the ruby inline flag mechanism.
      Meaning a regex such as
        /foo/i
      can be written as
        '(?i)foo' or '(?i:foo)'

      Full example:
      ```
      firewallchain { 'INPUT:filter:IPv4':
        purge => true,
        ignore => [
          '-j fail2ban-ssh', # ignore the fail2ban jump rule
          '--comment "[^"]*(?i:ignore)[^"]*"', # ignore any rules with "ignore" (case insensitive) in the comment in the rule
        ],
      }
      ```
      DESC
    },
    ignore_foreign: {
      type: 'Boolean',
      default: false,
      desc: <<-DESC
      Ignore rules that do not match the puppet title pattern "^\d+[[:graph:][:space:]]" when purging unmanaged firewall rules in this chain.
      This can be used to ignore rules that were not put in by puppet. Beware that nothing keeps other systems from configuring firewall rules with a comment that starts with digits, and is indistinguishable from puppet-configured rules.
      DESC
    }
  },
)