/
redhat.pp
188 lines (174 loc) · 6.44 KB
/
redhat.pp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
# @summary
# Manages the `iptables` service on RedHat-alike systems.
#
# @param ensure
# Ensure parameter passed onto Service[] resources. Valid options: 'running' or 'stopped'. Defaults to 'running'.
#
# @param ensure_v6
# Ensure parameter passed onto Service[] resources. Valid options: 'running' or 'stopped'. Defaults to 'undef'.
#
# @param enable
# Enable parameter passed onto Service[] resources. Defaults to 'true'.
#
# @param enable_v6
# Enable parameter passed onto Service[] resources. Defaults to 'undef'.
#
# @param service_name
# Specify the name of the IPv4 iptables service. Defaults defined in firewall::params.
#
# @param service_name_v6
# Specify the name of the IPv4 iptables service. Defaults defined in firewall::params.
#
# @param package_name
# Specify the platform-specific package(s) to install. Defaults defined in firewall::params.
#
# @param package_ensure
# Controls the state of the iptables package on your system. Valid options: 'present' or 'latest'. Defaults to 'latest'.
#
# @param sysconfig_manage
# Enable sysconfig configuration for iptables/ip6tables files. Defaults defined in firewall::params.
# This is disabled for RedHat/CentOS 8+.
#
# @api private
#
class firewall::linux::redhat (
Enum[running, stopped, 'running', 'stopped'] $ensure = running,
Optional[Enum[running, stopped, 'running', 'stopped']] $ensure_v6 = undef,
Variant[Boolean, String[1]] $enable = true,
Optional[Variant[Boolean, String[1]]] $enable_v6 = undef,
Variant[String[1], Array[String[1]]] $service_name = $firewall::params::service_name,
Optional[String[1]] $service_name_v6 = $firewall::params::service_name_v6,
Optional[Variant[String[1], Array[String[1]]]] $package_name = $firewall::params::package_name,
Enum[present, latest, 'present', 'latest'] $package_ensure = $firewall::params::package_ensure,
Boolean $sysconfig_manage = $firewall::params::sysconfig_manage,
Boolean $firewalld_manage = $firewall::params::firewalld_manage,
) inherits firewall::params {
$_ensure_v6 = pick($ensure_v6, $ensure)
$_enable_v6 = pick($enable_v6, $enable)
# RHEL 7 / CentOS 7 and later and Fedora 15 and later require the iptables-services
# package, which provides the /usr/libexec/iptables/iptables.init used by
# lib/puppet/util/firewall.rb.
if ($facts['os']['name'] != 'Amazon') {
if $firewalld_manage {
service { 'firewalld':
ensure => stopped,
enable => false,
before => [Package[$package_name], Service[$service_name]],
}
}
}
# in RHEL 8 / CentOS 8 nftables provides a replacement iptables cli
# but there is no nftables specific for ipv6 so throw a warning
if !$service_name_v6 and ($ensure_v6 or $enable_v6) {
warning('No v6 service available, $ensure_v6 and $enable_v6 are ignored')
}
if $package_name {
ensure_packages($package_name, {
'ensure' => $package_ensure,
'before' => Service[$service_name] }
)
}
if ($facts['os']['name'] != 'Amazon') {
if $ensure == 'running' {
$running_command = ['/usr/bin/systemctl', 'daemon-reload']
exec { '/usr/bin/systemctl daemon-reload':
command => $running_command,
require => Package[$package_name],
before => Service[$service_name, $service_name_v6],
subscribe => Package[$package_name],
refreshonly => true,
}
}
}
if ($facts['os']['name'] == 'Amazon') and (versioncmp($facts['os']['release']['major'], '4') >= 0)
or ($facts['os']['name'] == 'Amazon') and (versioncmp($facts['os']['release']['major'], '2') >= 0) {
service { $service_name:
ensure => $ensure,
enable => $enable,
hasstatus => true,
provider => systemd,
}
if $service_name_v6 {
service { $service_name_v6:
ensure => $_ensure_v6,
enable => $_enable_v6,
hasstatus => true,
provider => systemd,
}
}
} else {
service { $service_name:
ensure => $ensure,
enable => $enable,
hasstatus => true,
}
if $service_name_v6 {
service { $service_name_v6:
ensure => $_ensure_v6,
enable => $_enable_v6,
hasstatus => true,
}
}
}
if $sysconfig_manage {
file { "/etc/sysconfig/${service_name}":
ensure => file,
owner => 'root',
group => 'root',
mode => '0600',
}
if $service_name_v6 {
file { "/etc/sysconfig/${service_name_v6}":
ensure => file,
owner => 'root',
group => 'root',
mode => '0600',
}
}
# Redhat 7 selinux user context for /etc/sysconfig/iptables is set to system_u
# Redhat 7 selinux type context for /etc/sysconfig/iptables is set to system_conf_t
case $facts['os']['selinux']['enabled'] {
#lint:ignore:quoted_booleans
'true',true: {
case $facts['os']['name'] {
'CentOS': {
case $facts['os']['release']['full'] {
/^6\..*/: {
$seluser = 'unconfined_u'
$seltype = 'system_conf_t'
}
/^7\..*/: {
$seluser = 'system_u'
$seltype = 'system_conf_t'
}
/^8\..*/: {
$seluser = 'system_u'
$seltype = 'etc_t'
}
/^9\..*/: {
$seluser = 'system_u'
$seltype = 'etc_t'
}
default : {
$seluser = 'unconfined_u'
$seltype = 'etc_t'
}
}
File<| title == "/etc/sysconfig/${service_name}" |> { seluser => $seluser, seltype => $seltype }
File<| title == "/etc/sysconfig/${service_name_v6}" |> { seluser => $seluser, seltype => $seltype }
}
# Fedora uses the same SELinux context as Redhat
'Fedora': {
$seluser = 'system_u'
$seltype = 'system_conf_t'
File<| title == "/etc/sysconfig/${service_name}" |> { seluser => $seluser, seltype => $seltype }
File<| title == "/etc/sysconfig/${service_name_v6}" |> { seluser => $seluser, seltype => $seltype }
}
default: {}
}
}
default: {}
#lint:endignore
}
}
}