Files
mgmt/modules/meta/router.mcl
James Shubin d30ff6cfae legal: Remove year
Instead of constantly making these updates, let's just remove the year
since things are stored in git anyways, and this is not an actual modern
legal risk anymore.
2025-01-26 16:24:51 -05:00

205 lines
5.6 KiB
Plaintext

# Mgmt
# Copyright (C) James Shubin and the project contributors
# Written by James Shubin <james@shubin.ca> and the project contributors
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <https://www.gnu.org/licenses/>.
#
# Additional permission under GNU GPL version 3 section 7
#
# If you modify this program, or any covered work, by linking or combining it
# with embedded mcl code and modules (and that the embedded mcl code and
# modules which link with this program, contain a copy of their source code in
# the authoritative form) containing parts covered by the terms of any other
# license, the licensors of this program grant you additional permission to
# convey the resulting work. Furthermore, the licensors of this program grant
# the original author, James Shubin, additional permission to update this
# additional permission if he deems it necessary to achieve the goals of this
# additional permission.
import "net"
import "git://github.com/purpleidea/mgmt/modules/dhcp/"
import "git://github.com/purpleidea/mgmt/modules/misc/"
import "git://github.com/purpleidea/mgmt/modules/purpleidea/"
import "git://github.com/purpleidea/mgmt/modules/shorewall/"
class router($st) {
$net_dev = $st->net_dev || "eth0"
$net_mac = $st->net_mac
$loc_dev = $st->loc_dev || ""
$loc_mac = $st->loc_mac || ""
$loc_uuid = $st->loc_uuid || "" # 01234567-89ab-cdef-0123-456789abcdef
$loc_network = $st->loc_network # cidr
$loc_ip = $st->loc_ip || net.cidr_to_first($loc_network) # no cidr
$loc_broadcast = $st->loc_broadcast || net.cidr_to_last($loc_network)
$loc_range = $st->loc_range || struct{start => "", end => "",} # struct with start, end fields
$dns = $st->dns
include misc.network_rename($net_mac, $net_dev)
if $loc_dev != "" and $loc_mac != "" {
include misc.network_rename($loc_mac, $loc_dev)
}
if $loc_dev != "" {
$prefix = net.cidr_to_prefix($loc_network)
include misc.network_manager_static(struct{
uuid => $loc_uuid,
dev => $loc_dev, # formerly enp0s2
cidr => "${loc_ip}/${prefix}",
dns => $dns,
})
}
include purpleidea.base() # adds some utility packages
include shorewall.prepare()
include dhcp.server(struct{
authoritative => true,
}) as dhcp_server # good!
include dhcp_server.subnet("loc", struct{
network => net.cidr_to_ip($loc_network), # network address
netmask => net.cidr_to_mask($loc_network), # eg: 255.255.255.0
router => $loc_ip, # first address
broadcast => $loc_broadcast, # last address
range => $loc_range,
dns => $dns,
comment => "internal network",
})
#include dhcp_server.host("computer1", struct{
# macaddress => "00:11:22:33:44:55",
# fixedaddress => ["192.168.100.13",],
# hostname => "computer1",
#})
include shorewall.prepare() # add sysctl and disable firewalld
include shorewall.firewall() as firewall
# TODO: can I pass a list in instead?
include firewall.zone("net", struct{})
include firewall.zone("loc", struct{})
# eg: eth0
include firewall.interface("${net_dev}", "net", struct{
interface => "NET_IF", # default if not specified
options => [
"dhcp",
"tcpflags",
"nosmurfs",
"routefilter",
"sourceroute=0",
"logmartians",
],
})
include firewall.interface("${loc_dev}", "loc", struct{
interface => "LOC_IF", # default if not specified
options => [
"dhcp",
"tcpflags",
"nosmurfs",
"routefilter",
"logmartians",
],
})
include firewall.policy("000-fw-net-ACCEPT", struct{
source => "fw",
dest => "net",
policy => "ACCEPT",
})
include firewall.policy("000-loc-net-ACCEPT", struct{
source => "loc",
dest => "net",
policy => "ACCEPT",
})
include firewall.policy("888-net-all-DROP", struct{
source => "net",
dest => "all",
policy => "DROP",
log => true,
})
include firewall.policy("999-all-all-REJECT", struct{
source => "all",
dest => "all",
policy => "REJECT",
log => true,
comment => "THE FOLLOWING POLICY MUST BE LAST",
})
include firewall.snat("masq", struct{
action => "MASQUERADE",
source => ["${loc_network}",], # ip/cidr of the LOC network, eg: 192.168.100.0/24
dest => "NET_IF",
log => true,
})
include firewall.stoppedrule("loc-all", struct{
action => "ACCEPT",
source => "LOC_IF",
dest => "-", # all
})
include firewall.stoppedrule("all-loc", struct{
action => "ACCEPT",
source => "-", # all
dest => "LOC_IF",
})
include firewall.rule("ssh-from-loc-to-fw", struct{
action => "SSH(ACCEPT)",
source => "loc",
dest => "$FW",
#proto => "",
#port => "",
comment => "local administration",
})
include firewall.rule("ssh-from-net-to-fw", struct{
action => "SSH(ACCEPT)",
source => "net",
dest => "$FW",
#proto => "",
#port => "",
comment => "remote administration",
})
}
class router:dhcp_host($st) {
$h = $st->hostname
$m = $st->macaddress
$i = $st->ipaddress
# TODO: add these checks
#fail(not net.in_network($loc_network, $i))
#$range_start = $loc_range->start || ""
#$range_end = $loc_range->end || ""
#if $range_start != "" and $range_end != "" {
# fail(net.in_range($range_start, $range_end, $i))
#}
include dhcp_server.host("${h}", struct{
macaddress => "${m}",
fixedaddress => ["${i}",],
hostname => "${h}",
})
}