
This patch enables Firewalling in this Puppet modules in a flexible way. * Enable firewalling optionnaly (disabled by default). * Enable 'pre' firewalling with defaults rules. * Enable 'post' firewalling with DROP rule, with a debug option to disable it. * Enable default rules for all services (OpenStack, etc). * Ability to add custom firewall rules with Hiera * Update puppetlabs-firewall refs * Refactorize unit-tests
91 lines
3.1 KiB
Puppet
91 lines
3.1 KiB
Puppet
#
|
|
# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
# == Class: cloud::compute::api
|
|
#
|
|
# Install a Nova-API node
|
|
#
|
|
# === Parameters:
|
|
#
|
|
# [*firewall_settings*]
|
|
# (optional) Allow to add custom parameters to firewall rules
|
|
# Should be an hash.
|
|
# Default to {}
|
|
#
|
|
class cloud::compute::api(
|
|
$ks_keystone_internal_host = '127.0.0.1',
|
|
$ks_keystone_internal_proto = 'http',
|
|
$ks_nova_password = 'novapassword',
|
|
$neutron_metadata_proxy_shared_secret = 'metadatapassword',
|
|
$api_eth = '127.0.0.1',
|
|
$ks_nova_public_port = '8774',
|
|
$ks_ec2_public_port = '8773',
|
|
$ks_metadata_public_port = '8775',
|
|
$firewall_settings = {},
|
|
){
|
|
|
|
include 'cloud::compute'
|
|
|
|
class { 'nova::api':
|
|
enabled => true,
|
|
auth_host => $ks_keystone_internal_host,
|
|
auth_protocol => $ks_keystone_internal_proto,
|
|
admin_password => $ks_nova_password,
|
|
api_bind_address => $api_eth,
|
|
metadata_listen => $api_eth,
|
|
neutron_metadata_proxy_shared_secret => $neutron_metadata_proxy_shared_secret,
|
|
osapi_v3 => true,
|
|
}
|
|
|
|
if $::cloud::manage_firewall {
|
|
cloud::firewall::rule{ '100 allow nova-api access':
|
|
port => $ks_nova_public_port,
|
|
extras => $firewall_settings,
|
|
}
|
|
cloud::firewall::rule{ '100 allow nova-metadata access':
|
|
port => $ks_metadata_public_port,
|
|
extras => $firewall_settings,
|
|
}
|
|
cloud::firewall::rule{ '100 allow nova-ec2 access':
|
|
port => $ks_ec2_public_port,
|
|
extras => $firewall_settings,
|
|
}
|
|
}
|
|
|
|
@@haproxy::balancermember{"${::fqdn}-compute_api_ec2":
|
|
listening_service => 'ec2_api_cluster',
|
|
server_names => $::hostname,
|
|
ipaddresses => $api_eth,
|
|
ports => $ks_ec2_public_port,
|
|
options => 'check inter 2000 rise 2 fall 5'
|
|
}
|
|
|
|
@@haproxy::balancermember{"${::fqdn}-compute_api_nova":
|
|
listening_service => 'nova_api_cluster',
|
|
server_names => $::hostname,
|
|
ipaddresses => $api_eth,
|
|
ports => $ks_nova_public_port,
|
|
options => 'check inter 2000 rise 2 fall 5'
|
|
}
|
|
|
|
@@haproxy::balancermember{"${::fqdn}-compute_api_metadata":
|
|
listening_service => 'metadata_api_cluster',
|
|
server_names => $::hostname,
|
|
ipaddresses => $api_eth,
|
|
ports => $ks_metadata_public_port,
|
|
options => 'check inter 2000 rise 2 fall 5'
|
|
}
|
|
}
|