X-Git-Url: https://git.openstreetmap.org/chef.git/blobdiff_plain/21958591555b0b80370e944e3128ac5d533c281d..f30f230da23603e3c7598205219ce01e9820c470:/cookbooks/networking/recipes/default.rb diff --git a/cookbooks/networking/recipes/default.rb b/cookbooks/networking/recipes/default.rb index dc5c69227..ab139e9ff 100644 --- a/cookbooks/networking/recipes/default.rb +++ b/cookbooks/networking/recipes/default.rb @@ -23,20 +23,20 @@ require "ipaddr" node[:networking][:interfaces].each do |name, interface| - if interface[:role] && role = node[:networking][:roles][interface[:role]] + if interface[:role] && (role = node[:networking][:roles][interface[:role]]) if role[interface[:family]] - node.default[:networking][:interfaces][name][:prefix] = role[interface[:family]][:prefix] - node.default[:networking][:interfaces][name][:gateway] = role[interface[:family]][:gateway] + node.set[:networking][:interfaces][name][:prefix] = role[interface[:family]][:prefix] + node.set[:networking][:interfaces][name][:gateway] = role[interface[:family]][:gateway] end - node.default[:networking][:interfaces][name][:metric] = role[:metric] - node.default[:networking][:interfaces][name][:zone] = role[:zone] + node.set[:networking][:interfaces][name][:metric] = role[:metric] + node.set[:networking][:interfaces][name][:zone] = role[:zone] end prefix = node[:networking][:interfaces][name][:prefix] - node.default[:networking][:interfaces][name][:netmask] = (~IPAddr.new(interface[:address]).mask(0)).mask(prefix) - node.default[:networking][:interfaces][name][:network] = IPAddr.new(interface[:address]).mask(prefix) + node.set[:networking][:interfaces][name][:netmask] = ~IPAddr.new(interface[:address]).mask(0).mask(prefix) + node.set[:networking][:interfaces][name][:network] = IPAddr.new(interface[:address]).mask(prefix) end template "/etc/network/interfaces" do @@ -83,24 +83,24 @@ end node.interfaces(:role => :internal) do |interface| if interface[:gateway] && interface[:gateway] != interface[:address] search(:node, "networking_interfaces*address:#{interface[:gateway]}") do |gateway| - if gateway[:openvpn] - gateway[:openvpn][:tunnels].each_value do |tunnel| - if tunnel[:peer][:address] - route tunnel[:peer][:address] do - netmask "255.255.255.255" - gateway interface[:gateway] - device interface[:interface] - end + next unless gateway[:openvpn] + + gateway[:openvpn][:tunnels].each_value do |tunnel| + if tunnel[:peer][:address] # ~FC023 + route tunnel[:peer][:address] do + netmask "255.255.255.255" + gateway interface[:gateway] + device interface[:interface] end + end + + next unless tunnel[:peer][:networks] - if tunnel[:peer][:networks] - tunnel[:peer][:networks].each do |network| - route network[:address] do - netmask network[:netmask] - gateway interface[:gateway] - device interface[:interface] - end - end + tunnel[:peer][:networks].each do |network| + route network[:address] do + netmask network[:netmask] + gateway interface[:gateway] + device interface[:interface] end end end @@ -111,14 +111,14 @@ end zones = {} search(:node, "networking:interfaces").collect do |n| - if n[:fqdn] != node[:fqdn] - n.interfaces.each do |interface| - if interface[:role] == "external" && interface[:zone] - zones[interface[:zone]] ||= Hash.new - zones[interface[:zone]][interface[:family]] ||= Array.new - zones[interface[:zone]][interface[:family]] << interface[:address] - end - end + next if n[:fqdn] == node[:fqdn] + + n.interfaces.each do |interface| + next unless interface[:role] == "external" && interface[:zone] + + zones[interface[:zone]] ||= {} + zones[interface[:zone]][interface[:family]] ||= [] + zones[interface[:zone]][interface[:family]] << interface[:address] end end @@ -189,6 +189,14 @@ template "/etc/shorewall/rules" do notifies :restart, "service[shorewall]" end +template "/etc/logrotate.d/shorewall" do + source "logrotate.shorewall.erb" + owner "root" + group "root" + mode 0644 + variables :name => "shorewall" +end + firewall_rule "limit-icmp-echo" do action :accept family :inet @@ -294,6 +302,14 @@ unless node.interfaces(:family => :inet6).empty? notifies :restart, "service[shorewall6]" end + template "/etc/logrotate.d/shorewall6" do + source "logrotate.shorewall.erb" + owner "root" + group "root" + mode 0644 + variables :name => "shorewall6" + end + firewall_rule "limit-icmp6-echo" do action :accept family :inet6