Puppet Class: profile::firewall::nftables_throttling

Defined in:
modules/profile/manifests/firewall/nftables_throttling.pp

Summary

manages nftables based throttling

Overview

SPDX-License-Identifier: Apache-2.0

Parameters:

  • ensure (Wmflib::Ensure) (defaults to: lookup('profile::firewall::nftables_throttling::ensure', {default_value => present}))
  • max_connections (Integer) (defaults to: lookup('profile::firewall::nftables_throttling::max_connections', {default_value => 32}))
  • throttle_duration (Integer) (defaults to: lookup('profile::firewall::nftables_throttling::throttle_duration', {default_value => 300}))
  • nft_policy (Enum['accept', 'drop']) (defaults to: lookup('profile::firewall::nftables_throttling::nft_policy', {default_value => 'accept'}))
  • nft_logging (Boolean) (defaults to: lookup('profile::firewall::nftables_throttling::nft_logging', {default_value => false}))
  • port (Integer) (defaults to: lookup('profile::firewall::nftables_throttling::port', {default_value => 443}))
  • abusers (Array[Stdlib::IP::Address]) (defaults to: lookup('profile::firewall::nftables_throttling::abusers', {default_value => []}))


9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
# File 'modules/profile/manifests/firewall/nftables_throttling.pp', line 9

class profile::firewall::nftables_throttling (
    Wmflib::Ensure $ensure = lookup('profile::firewall::nftables_throttling::ensure',
    {default_value => present}),
    Integer $max_connections = lookup('profile::firewall::nftables_throttling::max_connections',
    {default_value => 32}), # allow 32 parallel connections
    Integer $throttle_duration = lookup('profile::firewall::nftables_throttling::throttle_duration',
    {default_value => 300}), # ban clients above for 300 seconds
    Enum['accept', 'drop'] $nft_policy = lookup('profile::firewall::nftables_throttling::nft_policy',
    {default_value => 'accept'}),
    Boolean $nft_logging = lookup('profile::firewall::nftables_throttling::nft_logging',
    {default_value => false}),
    Integer $port = lookup('profile::firewall::nftables_throttling::port',
    {default_value => 443}),
    # TODO: Import them from confd/requestctl later T348734
    Array[Stdlib::IP::Address] $abusers = lookup('profile::firewall::nftables_throttling::abusers',
    {default_value => []}),
) {

    $nft_do_log = $nft_logging ? {
        true    => 'log ',
        default => '',
    }

    # add throttling nftables chain T366882
    nftables::file { 'throttling-chain':
        ensure  => $ensure,
        order   => 99,
        content => template('profile/firewall/throttling.nft.erb'),
    }

    $ensure_abusers = empty($abusers) ? {
        true    => 'absent',
        default => 'present',
    }

    # nftables has a problem with dropping of empty sets, so make sure we just create the drop rule if needed
    # Otherwise the sets have to be created with the dynamic flag
    $ipv4_abusers = $abusers.filter |$ip| { $ip =~ Stdlib::IP::Address::V4 }
    $ipv6_abusers = $abusers.filter |$ip| { $ip =~ Stdlib::IP::Address::V6 }
    $ensure_abusers_v4 = empty($ipv4_abusers) ? {
        true    => 'absent',
        default => 'present',
    }
    $ensure_abusers_v6 = empty($ipv6_abusers) ? {
        true    => 'absent',
        default => 'present',
    }

    # Create a nftables set ABUSERS and drop all traffic
    nftables::set { 'ABUSERS':
        ensure => $ensure_abusers,
        hosts  => $abusers,
    }
    nftables::file::input { 'drop-abuser-nets-v4':
        ensure  => $ensure_abusers_v4,
        order   => 9,
        content => @(EOF/L)
            ip saddr @ABUSERS_ipv4 drop
            | EOF
    }
    nftables::file::input { 'drop-abuser-nets-v6':
        ensure  => $ensure_abusers_v6,
        order   => 9,
        content => @(EOF/L)
            ip6 saddr @ABUSERS_ipv6 drop
            | EOF
    }

}