Files
mgmt/modules/meta/router.mcl
2025-02-13 06:33:47 -05:00

203 lines
5.6 KiB
Plaintext

# Mgmt
# Copyright (C) James Shubin and the project contributors
# Written by James Shubin <james@shubin.ca> and the project contributors
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <https://www.gnu.org/licenses/>.
#
# Additional permission under GNU GPL version 3 section 7
#
# If you modify this program, or any covered work, by linking or combining it
# with embedded mcl code and modules (and that the embedded mcl code and
# modules which link with this program, contain a copy of their source code in
# the authoritative form) containing parts covered by the terms of any other
# license, the licensors of this program grant you additional permission to
# convey the resulting work. Furthermore, the licensors of this program grant
# the original author, James Shubin, additional permission to update this
# additional permission if he deems it necessary to achieve the goals of this
# additional permission.
import "net"
import "git://github.com/purpleidea/mgmt/modules/dhcp/"
import "git://github.com/purpleidea/mgmt/modules/misc/"
import "git://github.com/purpleidea/mgmt/modules/purpleidea/"
import "git://github.com/purpleidea/mgmt/modules/shorewall/"
class router($st) {
$net_dev = $st->net_dev || "eth0"
$net_mac = $st->net_mac
$loc_dev = $st->loc_dev || ""
$loc_mac = $st->loc_mac || ""
$loc_uuid = $st->loc_uuid || "" # 01234567-89ab-cdef-0123-456789abcdef
$loc_network = $st->loc_network # cidr
$loc_ip = $st->loc_ip || net.cidr_to_first($loc_network) # no cidr
$loc_broadcast = $st->loc_broadcast || net.cidr_to_last($loc_network)
$loc_range = $st->loc_range || struct{start => "", end => "",} # struct with start, end fields
$dns = $st->dns
include misc.network_rename($net_mac, $net_dev)
if $loc_dev != "" and $loc_mac != "" {
include misc.network_rename($loc_mac, $loc_dev)
}
if $loc_dev != "" {
$prefix = net.cidr_to_prefix($loc_network)
include misc.network_manager_static(struct{
uuid => $loc_uuid,
dev => $loc_dev, # formerly enp0s2
cidr => "${loc_ip}/${prefix}",
dns => $dns,
})
}
include purpleidea.base() # adds some utility packages
include dhcp.server(struct{
authoritative => true,
}) as dhcp_server # good!
include dhcp_server.subnet("loc", struct{
network => net.cidr_to_ip($loc_network), # network address
netmask => net.cidr_to_mask($loc_network), # eg: 255.255.255.0
router => $loc_ip, # first address
broadcast => $loc_broadcast, # last address
range => $loc_range,
dns => $dns,
comment => "internal network",
})
#include dhcp_server.host("computer1", struct{
# macaddress => "00:11:22:33:44:55",
# fixedaddress => ["192.168.100.13",],
# hostname => "computer1",
#})
include shorewall.prepare() # add sysctl and disable firewalld
include shorewall.firewall() as firewall
# TODO: can I pass a list in instead?
include firewall.zone("net", struct{})
include firewall.zone("loc", struct{})
# eg: eth0
include firewall.interface("${net_dev}", "net", struct{
interface => "NET_IF", # default if not specified
options => [
"dhcp",
"tcpflags",
"nosmurfs",
"routefilter",
"sourceroute=0",
"logmartians",
],
})
include firewall.interface("${loc_dev}", "loc", struct{
interface => "LOC_IF", # default if not specified
options => [
"dhcp",
"tcpflags",
"nosmurfs",
"routefilter",
"logmartians",
],
})
include firewall.policy("000-fw-net-ACCEPT", struct{
source => "fw",
dest => "net",
policy => "ACCEPT",
})
include firewall.policy("000-loc-net-ACCEPT", struct{
source => "loc",
dest => "net",
policy => "ACCEPT",
})
include firewall.policy("888-net-all-DROP", struct{
source => "net",
dest => "all",
policy => "DROP",
log => true,
})
include firewall.policy("999-all-all-REJECT", struct{
source => "all",
dest => "all",
policy => "REJECT",
log => true,
comment => "THE FOLLOWING POLICY MUST BE LAST",
})
include firewall.snat("masq", struct{
action => "MASQUERADE",
source => ["${loc_network}",], # ip/cidr of the LOC network, eg: 192.168.100.0/24
dest => "NET_IF",
log => true,
})
include firewall.stoppedrule("loc-all", struct{
action => "ACCEPT",
source => "LOC_IF",
dest => "-", # all
})
include firewall.stoppedrule("all-loc", struct{
action => "ACCEPT",
source => "-", # all
dest => "LOC_IF",
})
include firewall.rule("ssh-from-loc-to-fw", struct{
action => "SSH(ACCEPT)",
source => "loc",
dest => "$FW",
#proto => "",
#port => "",
comment => "local administration",
})
include firewall.rule("ssh-from-net-to-fw", struct{
action => "SSH(ACCEPT)",
source => "net",
dest => "$FW",
#proto => "",
#port => "",
comment => "remote administration",
})
}
class router:dhcp_host($st) {
$h = $st->hostname
$m = $st->macaddress
$i = $st->ipaddress
# TODO: add these checks
#fail(not net.in_network($loc_network, $i))
#$range_start = $loc_range->start || ""
#$range_end = $loc_range->end || ""
#if $range_start != "" and $range_end != "" {
# fail(net.in_range($range_start, $range_end, $i))
#}
include dhcp_server.host("${h}", struct{
macaddress => "${m}",
fixedaddress => ["${i}",],
hostname => "${h}",
})
}