Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
S
slapos.core
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Hardik Juneja
slapos.core
Commits
839ad80d
Commit
839ad80d
authored
Oct 02, 2015
by
Alain Takoudjou
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Simplify firewalld usage and add tests scripts
parent
b1b0e86f
Changes
2
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
232 additions
and
20 deletions
+232
-20
slapos/grid/slapgrid.py
slapos/grid/slapgrid.py
+25
-18
slapos/tests/slapgrid.py
slapos/tests/slapgrid.py
+207
-2
No files found.
slapos/grid/slapgrid.py
View file @
839ad80d
...
@@ -171,6 +171,15 @@ def merged_options(args, configp):
...
@@ -171,6 +171,15 @@ def merged_options(args, configp):
options
[
'firewall'
][
"authorized_sources"
]
=
[
options
[
'firewall'
][
"authorized_sources"
]
=
[
source
.
strip
()
for
source
in
options
[
'firewall'
].
get
(
source
.
strip
()
for
source
in
options
[
'firewall'
].
get
(
"authorized_sources"
,
""
).
split
(
'
\
n
'
)
if
source
]
"authorized_sources"
,
""
).
split
(
'
\
n
'
)
if
source
]
options
[
'firewall'
][
'firewall_cmd'
]
=
options
[
'firewall'
].
get
(
"firewall_cmd"
,
"firewall-cmd"
)
options
[
'firewall'
][
'firewall_executable'
]
=
options
[
'firewall'
].
get
(
"firewall_executable"
,
"firewalld --nofork"
)
options
[
'firewall'
][
'firewall_executable'
]
=
options
[
'firewall'
].
get
(
"firewall_executable"
,
"firewalld --nofork"
)
options
[
'firewall'
][
'reload_config_cmd'
]
=
options
[
'firewall'
].
get
(
"reload_config_cmd"
,
"slapos node restart firewall"
).
split
(
' '
)
return
options
return
options
...
@@ -381,7 +390,7 @@ class Slapgrid(object):
...
@@ -381,7 +390,7 @@ class Slapgrid(object):
'etc'
,
'supervisord.conf.d'
)
'etc'
,
'supervisord.conf.d'
)
supervisord_firewall_conf
=
os
.
path
.
join
(
supervisord_conf_folder_path
,
supervisord_firewall_conf
=
os
.
path
.
join
(
supervisord_conf_folder_path
,
'firewall.conf'
)
'firewall.conf'
)
if
not
self
.
firewall_conf
:
if
not
self
.
firewall_conf
or
self
.
firewall_conf
.
get
(
'testing'
,
False
)
:
if
os
.
path
.
exists
(
supervisord_firewall_conf
):
if
os
.
path
.
exists
(
supervisord_firewall_conf
):
os
.
unlink
(
supervisord_firewall_conf
)
os
.
unlink
(
supervisord_firewall_conf
)
return
return
...
@@ -649,21 +658,23 @@ stderr_logfile_backups=1
...
@@ -649,21 +658,23 @@ stderr_logfile_backups=1
# Apply changes: reload configuration
# Apply changes: reload configuration
# XXX - need to check firewalld reload instead of restart
# XXX - need to check firewalld reload instead of restart
self
.
logger
.
info
(
"Reloading firewall configuration..."
)
self
.
logger
.
info
(
"Reloading firewall configuration..."
)
reload_cmd
=
[
'slapos'
,
'node'
,
'restart'
,
'firewall
'
]
reload_cmd
=
self
.
firewall_conf
[
'reload_config_cmd
'
]
reload_process
=
subprocess
.
Popen
(
reload_cmd
,
reload_process
=
subprocess
.
Popen
(
reload_cmd
,
stdout
=
subprocess
.
PIPE
,
stdout
=
subprocess
.
PIPE
,
stderr
=
subprocess
.
PIPE
)
stderr
=
subprocess
.
PIPE
,
shell
=
True
)
result
=
reload_process
.
communicate
()[
0
]
result
=
reload_process
.
communicate
()[
0
]
if
reload_process
.
returncode
==
1
:
if
reload_process
.
returncode
==
1
:
self
.
logger
.
warning
(
'FirewallD: %s'
%
result
)
self
.
logger
.
warning
(
'FirewallD: %s'
%
result
)
def
_
addFirewallRules
(
self
,
partition_id
,
ip
,
ip_list
,
ip_type
=
'ipv4'
,
add_rules
=
True
):
def
_
getFirewallRules
(
self
,
ip
,
ip_list
,
ip_type
=
'ipv4'
):
"""
"""
"""
"""
if
ip_type
not
in
[
'ipv4'
,
'ipv6'
,
'eb'
]:
if
ip_type
not
in
[
'ipv4'
,
'ipv6'
,
'eb'
]:
raise
NotImplementedError
(
"firewall-cmd has not rules with tables %s."
%
ip_type
)
raise
NotImplementedError
(
"firewall-cmd has not rules with tables %s."
%
ip_type
)
command
=
'firewall-cmd --permanent --direct --add-rule %s filter'
%
ip_type
fw_cmd
=
self
.
firewall_conf
[
'firewall_cmd'
]
command
=
'%s --permanent --direct --add-rule %s filter'
%
(
fw_cmd
,
ip_type
)
cmd_list
=
[]
cmd_list
=
[]
...
@@ -674,12 +685,6 @@ stderr_logfile_backups=1
...
@@ -674,12 +685,6 @@ stderr_logfile_backups=1
# Configure FORWARD rules
# Configure FORWARD rules
cmd_list
.
append
(
'%s FORWARD 0 -s %s -d %s -j ACCEPT'
%
(
command
,
cmd_list
.
append
(
'%s FORWARD 0 -s %s -d %s -j ACCEPT'
%
(
command
,
other_ip
,
ip
))
other_ip
,
ip
))
# configure ESTABLISHED,RELATED rules
cmd_list
.
append
(
'%s INPUT 0 -s %s -d %s -m state --state ESTABLISHED,RELATED -j ACCEPT'
%
(
command
,
other_ip
,
ip
))
# Configure FORWARD rules
cmd_list
.
append
(
'%s FORWARD 0 -s %s -d %s -m state --state ESTABLISHED,RELATED -j ACCEPT'
%
(
command
,
other_ip
,
ip
))
# Drop all other requests
# Drop all other requests
cmd_list
.
append
(
'%s INPUT 1000 -d %s -j DROP'
%
(
command
,
ip
))
cmd_list
.
append
(
'%s INPUT 1000 -d %s -j DROP'
%
(
command
,
ip
))
...
@@ -689,7 +694,7 @@ stderr_logfile_backups=1
...
@@ -689,7 +694,7 @@ stderr_logfile_backups=1
cmd_list
.
append
(
'%s FORWARD 900 -d %s -m state --state ESTABLISHED,RELATED -j DROP'
%
(
cmd_list
.
append
(
'%s FORWARD 900 -d %s -m state --state ESTABLISHED,RELATED -j DROP'
%
(
command
,
ip
))
command
,
ip
))
self
.
_checkAddFirewallRules
(
partition_id
,
cmd_list
,
add
=
add_rules
)
return
cmd_list
def
_setupComputerPartitionFirewall
(
self
,
computer_partition
,
ip_list
,
authorized_ip_list
,
drop_entries
=
False
):
def
_setupComputerPartitionFirewall
(
self
,
computer_partition
,
ip_list
,
authorized_ip_list
,
drop_entries
=
False
):
"""
"""
...
@@ -719,7 +724,9 @@ stderr_logfile_backups=1
...
@@ -719,7 +724,9 @@ stderr_logfile_backups=1
authorized_ipv6_list
.
append
(
ip
)
authorized_ipv6_list
.
append
(
ip
)
filter_dict
=
getattr
(
computer_partition
,
'_filter_dict'
,
None
)
filter_dict
=
getattr
(
computer_partition
,
'_filter_dict'
,
None
)
extra_list
=
filter_dict
.
get
(
'authorized_sources'
,
''
).
split
(
' '
)
extra_list
=
[]
if
filter_dict
is
not
None
:
extra_list
=
filter_dict
.
get
(
'authorized_sources'
,
''
).
split
(
' '
)
extra_list
.
extend
(
self
.
firewall_conf
.
get
(
'authorized_sources'
,
[]))
extra_list
.
extend
(
self
.
firewall_conf
.
get
(
'authorized_sources'
,
[]))
for
ip
in
extra_list
:
for
ip
in
extra_list
:
if
not
ip
:
if
not
ip
:
...
@@ -738,11 +745,11 @@ stderr_logfile_backups=1
...
@@ -738,11 +745,11 @@ stderr_logfile_backups=1
self
.
logger
.
info
(
"Removing firewall configuration..."
)
self
.
logger
.
info
(
"Removing firewall configuration..."
)
for
ip
in
ipv4_list
:
for
ip
in
ipv4_list
:
self
.
_addFirewallRules
(
computer_partition
.
getId
()
,
cmd_list
=
self
.
_getFirewallRules
(
ip
,
ip
,
authorized_ipv4_list
,
authorized_ipv4_list
,
ip_type
=
'ipv4'
)
ip_type
=
'ipv4'
,
self
.
_checkAddFirewallRules
(
computer_partition
.
getId
(),
cmd_list
,
add_rules
=
add_rules
)
add
=
add_rules
)
def
processComputerPartition
(
self
,
computer_partition
):
def
processComputerPartition
(
self
,
computer_partition
):
"""
"""
...
...
slapos/tests/slapgrid.py
View file @
839ad80d
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment