root / REFERENCE.md @ c3f6e1ff
Historique | Voir | Annoter | Télécharger (25,3 ko)
1 |
# Reference |
---|---|
2 |
|
3 |
<!-- DO NOT EDIT: This document was generated by Puppet Strings --> |
4 |
|
5 |
## Table of Contents |
6 |
|
7 |
### Classes |
8 |
|
9 |
* [`nftables`](#nftables): Configure nftables |
10 |
* [`nftables::bridges`](#nftablesbridges): allow forwarding traffic on bridges |
11 |
* [`nftables::inet_filter`](#nftablesinet_filter): manage basic chains in table inet filter |
12 |
* [`nftables::ip_nat`](#nftablesip_nat): manage basic chains in table ip nat |
13 |
* [`nftables::rules::afs3_callback`](#nftablesrulesafs3_callback): Open call back port for AFS clients |
14 |
* [`nftables::rules::ceph`](#nftablesrulesceph): Ceph is a distributed object store and file system. Enable this to support Ceph's Object Storage Daemons (OSD), Metadata Server Daemons (MDS) |
15 |
* [`nftables::rules::ceph_mon`](#nftablesrulesceph_mon): Ceph is a distributed object store and file system. Enable this option to support Ceph's Monitor Daemon. |
16 |
* [`nftables::rules::dhcpv6_client`](#nftablesrulesdhcpv6_client) |
17 |
* [`nftables::rules::dns`](#nftablesrulesdns): manage in dns |
18 |
* [`nftables::rules::http`](#nftablesruleshttp): manage in http |
19 |
* [`nftables::rules::https`](#nftablesruleshttps): manage in https |
20 |
* [`nftables::rules::icinga2`](#nftablesrulesicinga2): manage in icinga2 |
21 |
* [`nftables::rules::icmp`](#nftablesrulesicmp) |
22 |
* [`nftables::rules::nfs`](#nftablesrulesnfs): manage in nfs4 |
23 |
* [`nftables::rules::nfs3`](#nftablesrulesnfs3): manage in nfs3 |
24 |
* [`nftables::rules::node_exporter`](#nftablesrulesnode_exporter): manage in node exporter |
25 |
* [`nftables::rules::ospf`](#nftablesrulesospf): manage in ospf |
26 |
* [`nftables::rules::ospf3`](#nftablesrulesospf3): manage in ospf3 |
27 |
* [`nftables::rules::out::all`](#nftablesrulesoutall): allow all outbound |
28 |
* [`nftables::rules::out::ceph_client`](#nftablesrulesoutceph_client): Ceph is a distributed object store and file system. Enable this to be a client of Ceph's Monitor (MON), Object Storage Daemons (OSD), Metadat |
29 |
* [`nftables::rules::out::chrony`](#nftablesrulesoutchrony): manage out chrony |
30 |
* [`nftables::rules::out::dhcp`](#nftablesrulesoutdhcp): manage out dhcp |
31 |
* [`nftables::rules::out::dhcpv6_client`](#nftablesrulesoutdhcpv6_client) |
32 |
* [`nftables::rules::out::dns`](#nftablesrulesoutdns): manage out dns |
33 |
* [`nftables::rules::out::http`](#nftablesrulesouthttp): manage out http |
34 |
* [`nftables::rules::out::https`](#nftablesrulesouthttps): manage out https |
35 |
* [`nftables::rules::out::icmp`](#nftablesrulesouticmp) |
36 |
* [`nftables::rules::out::kerberos`](#nftablesrulesoutkerberos): allows outbound access for kerberos |
37 |
* [`nftables::rules::out::mysql`](#nftablesrulesoutmysql): manage out mysql |
38 |
* [`nftables::rules::out::nfs`](#nftablesrulesoutnfs): manage out nfs |
39 |
* [`nftables::rules::out::nfs3`](#nftablesrulesoutnfs3): manage out nfs3 |
40 |
* [`nftables::rules::out::openafs_client`](#nftablesrulesoutopenafs_client): allows outbound access for afs clients |
41 |
* [`nftables::rules::out::ospf`](#nftablesrulesoutospf): manage out ospf |
42 |
* [`nftables::rules::out::ospf3`](#nftablesrulesoutospf3): manage out ospf3 |
43 |
* [`nftables::rules::out::postgres`](#nftablesrulesoutpostgres): manage out postgres |
44 |
* [`nftables::rules::out::puppet`](#nftablesrulesoutpuppet): manage outgoing puppet |
45 |
* [`nftables::rules::out::smtp`](#nftablesrulesoutsmtp): manage out smtp |
46 |
* [`nftables::rules::out::ssh`](#nftablesrulesoutssh): manage out ssh |
47 |
* [`nftables::rules::out::ssh::remove`](#nftablesrulesoutsshremove): disable outgoing ssh |
48 |
* [`nftables::rules::out::tor`](#nftablesrulesouttor): manage out tor |
49 |
* [`nftables::rules::out::wireguard`](#nftablesrulesoutwireguard): manage out wireguard |
50 |
* [`nftables::rules::puppet`](#nftablesrulespuppet): manage in puppet |
51 |
* [`nftables::rules::smtp`](#nftablesrulessmtp): manage in smtp |
52 |
* [`nftables::rules::smtp_submission`](#nftablesrulessmtp_submission): manage in smtp submission |
53 |
* [`nftables::rules::smtps`](#nftablesrulessmtps): manage in smtps |
54 |
* [`nftables::rules::ssh`](#nftablesrulesssh): manage in ssh |
55 |
* [`nftables::rules::tor`](#nftablesrulestor): manage in tor |
56 |
* [`nftables::rules::wireguard`](#nftablesruleswireguard): manage in wireguard |
57 |
* [`nftables::services::dhcpv6_client`](#nftablesservicesdhcpv6_client) |
58 |
* [`nftables::services::openafs_client`](#nftablesservicesopenafs_client) |
59 |
|
60 |
### Defined types |
61 |
|
62 |
* [`nftables::chain`](#nftableschain): manage a chain |
63 |
* [`nftables::config`](#nftablesconfig): manage a config snippet |
64 |
* [`nftables::rule`](#nftablesrule): manage a chain rule Name should be: CHAIN_NAME-rulename |
65 |
* [`nftables::rules::dnat4`](#nftablesrulesdnat4): manage a ipv4 dnat rule |
66 |
* [`nftables::rules::masquerade`](#nftablesrulesmasquerade): masquerade all outgoing traffic |
67 |
* [`nftables::rules::snat4`](#nftablesrulessnat4): manage a ipv4 snat rule |
68 |
* [`nftables::set`](#nftablesset): manage a named set |
69 |
* [`nftables::simplerule`](#nftablessimplerule): Provides a simplified interface to nftables::rule |
70 |
|
71 |
### Data types |
72 |
|
73 |
* [`Nftables::Addr`](#nftablesaddr): Represents an address expression to be used within a rule. |
74 |
* [`Nftables::Addr::Set`](#nftablesaddrset): Represents a set expression to be used within a rule. |
75 |
* [`Nftables::Port`](#nftablesport): Represents a port expression to be used within a rule. |
76 |
* [`Nftables::Port::Range`](#nftablesportrange): Represents a port range expression to be used within a rule. |
77 |
* [`Nftables::RuleName`](#nftablesrulename): Represents a rule name to be used in a raw rule created via nftables::rule. |
78 |
It's a dash separated string. The first component describes the chain to |
79 |
add the rule to, the second the rule name and the (optional) third a number. |
80 |
Ex: 'default_in-sshd', 'default_out-my_service-2'. |
81 |
* [`Nftables::SimpleRuleName`](#nftablessimplerulename): Represents a simple rule name to be used in a rule created via nftables::simplerule |
82 |
|
83 |
## Classes |
84 |
|
85 |
### `nftables` |
86 |
|
87 |
Configure nftables |
88 |
|
89 |
#### Examples |
90 |
|
91 |
##### allow dns out and do not allow ntp out |
92 |
|
93 |
```puppet |
94 |
class{'nftables: |
95 |
out_ntp = false, |
96 |
out_dns = true, |
97 |
} |
98 |
``` |
99 |
|
100 |
##### do not flush particular tables, fail2ban in this case |
101 |
|
102 |
```puppet |
103 |
class{'nftables': |
104 |
noflush_tables = ['inet-f2b-table'], |
105 |
} |
106 |
``` |
107 |
|
108 |
#### Parameters |
109 |
|
110 |
The following parameters are available in the `nftables` class. |
111 |
|
112 |
##### `out_all` |
113 |
|
114 |
Data type: `Boolean` |
115 |
|
116 |
Allow all outbound connections. If `true` then all other |
117 |
out parameters `out_ntp`, `out_dns`, ... will be assuemed |
118 |
false. |
119 |
|
120 |
Default value: ``false`` |
121 |
|
122 |
##### `out_ntp` |
123 |
|
124 |
Data type: `Boolean` |
125 |
|
126 |
Allow outbound to ntp servers. |
127 |
|
128 |
Default value: ``true`` |
129 |
|
130 |
##### `out_http` |
131 |
|
132 |
Data type: `Boolean` |
133 |
|
134 |
Allow outbound to http servers. |
135 |
|
136 |
Default value: ``true`` |
137 |
|
138 |
##### `out_https` |
139 |
|
140 |
Data type: `Boolean` |
141 |
|
142 |
Allow outbound to https servers. |
143 |
|
144 |
Default value: ``true`` |
145 |
|
146 |
##### `out_https` |
147 |
|
148 |
Allow outbound to https servers. |
149 |
|
150 |
Default value: ``true`` |
151 |
|
152 |
##### `out_icmp` |
153 |
|
154 |
Data type: `Boolean` |
155 |
|
156 |
Allow outbound ICMPv4/v6 traffic. |
157 |
|
158 |
Default value: ``true`` |
159 |
|
160 |
##### `in_ssh` |
161 |
|
162 |
Data type: `Boolean` |
163 |
|
164 |
Allow inbound to ssh servers. |
165 |
|
166 |
Default value: ``true`` |
167 |
|
168 |
##### `in_icmp` |
169 |
|
170 |
Data type: `Boolean` |
171 |
|
172 |
Allow inbound ICMPv4/v6 traffic. |
173 |
|
174 |
Default value: ``true`` |
175 |
|
176 |
##### `nat` |
177 |
|
178 |
Data type: `Boolean` |
179 |
|
180 |
Add default tables and chains to process NAT traffic. |
181 |
|
182 |
Default value: ``true`` |
183 |
|
184 |
##### `sets` |
185 |
|
186 |
Data type: `Hash` |
187 |
|
188 |
Allows sourcing set definitions directly from Hiera. |
189 |
|
190 |
Default value: `{}` |
191 |
|
192 |
##### `log_prefix` |
193 |
|
194 |
Data type: `String` |
195 |
|
196 |
String that will be used as prefix when logging packets. It can contain |
197 |
two variables using standard sprintf() string-formatting: |
198 |
* chain: Will be replaced by the name of the chain. |
199 |
* comment: Allows chains to add extra comments. |
200 |
|
201 |
Default value: `'[nftables] %<chain>s %<comment>s'` |
202 |
|
203 |
##### `log_limit` |
204 |
|
205 |
Data type: `Variant[Boolean[false], String]` |
206 |
|
207 |
String with the content of a limit statement to be applied |
208 |
to the rules that log discarded traffic. Set to false to |
209 |
disable rate limiting. |
210 |
|
211 |
Default value: `'3/minute burst 5 packets'` |
212 |
|
213 |
##### `reject_with` |
214 |
|
215 |
Data type: `Variant[Boolean[false], Pattern[/icmp(v6|x)? type .+|tcp reset/]]` |
216 |
|
217 |
How to discard packets not matching any rule. If `false`, the |
218 |
fate of the packet will be defined by the chain policy (normally |
219 |
drop), otherwise the packet will be rejected with the REJECT_WITH |
220 |
policy indicated by the value of this parameter. |
221 |
|
222 |
Default value: `'icmpx type port-unreachable'` |
223 |
|
224 |
##### `in_out_conntrack` |
225 |
|
226 |
Data type: `Boolean` |
227 |
|
228 |
Adds INPUT and OUTPUT rules to allow traffic that's part of an |
229 |
established connection and also to drop invalid packets. |
230 |
|
231 |
Default value: ``true`` |
232 |
|
233 |
##### `fwd_conntrack` |
234 |
|
235 |
Data type: `Boolean` |
236 |
|
237 |
Adds FORWARD rules to allow traffic that's part of an |
238 |
established connection and also to drop invalid packets. |
239 |
|
240 |
Default value: ``false`` |
241 |
|
242 |
##### `firewalld_enable` |
243 |
|
244 |
Data type: `Variant[Boolean[false], Enum['mask']]` |
245 |
|
246 |
Configures how the firewalld systemd service unit is enabled. It might be |
247 |
useful to set this to false if you're externaly removing firewalld from |
248 |
the system completely. |
249 |
|
250 |
Default value: `'mask'` |
251 |
|
252 |
##### `noflush_tables` |
253 |
|
254 |
Data type: `Optional[Array[Pattern[/^(ip|ip6|inet)-[-a-zA-Z0-9_]+$/],1]]` |
255 |
|
256 |
If specified only other existings tables will be flushed. |
257 |
If left unset all tables will be flushed via a `flush ruleset` |
258 |
|
259 |
Default value: ``undef`` |
260 |
|
261 |
##### `out_dns` |
262 |
|
263 |
Data type: `Boolean` |
264 |
|
265 |
|
266 |
|
267 |
Default value: ``true`` |
268 |
|
269 |
##### `rules` |
270 |
|
271 |
Data type: `Hash` |
272 |
|
273 |
|
274 |
|
275 |
Default value: `{}` |
276 |
|
277 |
### `nftables::bridges` |
278 |
|
279 |
allow forwarding traffic on bridges |
280 |
|
281 |
#### Parameters |
282 |
|
283 |
The following parameters are available in the `nftables::bridges` class. |
284 |
|
285 |
##### `ensure` |
286 |
|
287 |
Data type: `Enum['present','absent']` |
288 |
|
289 |
|
290 |
|
291 |
Default value: `'present'` |
292 |
|
293 |
##### `bridgenames` |
294 |
|
295 |
Data type: `Regexp` |
296 |
|
297 |
|
298 |
|
299 |
Default value: `/^br.+/` |
300 |
|
301 |
### `nftables::inet_filter` |
302 |
|
303 |
manage basic chains in table inet filter |
304 |
|
305 |
### `nftables::ip_nat` |
306 |
|
307 |
manage basic chains in table ip nat |
308 |
|
309 |
### `nftables::rules::afs3_callback` |
310 |
|
311 |
class{'nftables::rules::afs3_callback': |
312 |
saddr => ['192.168.0.0/16', '10.0.0.222'] |
313 |
} |
314 |
|
315 |
#### Parameters |
316 |
|
317 |
The following parameters are available in the `nftables::rules::afs3_callback` class. |
318 |
|
319 |
##### `saddr` |
320 |
|
321 |
Data type: `Array[Stdlib::IP::Address::V4,1]` |
322 |
|
323 |
list of source network ranges to a |
324 |
|
325 |
Default value: `['0.0.0.0/0']` |
326 |
|
327 |
### `nftables::rules::ceph` |
328 |
|
329 |
Ceph is a distributed object store and file system. |
330 |
Enable this to support Ceph's Object Storage Daemons (OSD), |
331 |
Metadata Server Daemons (MDS), or Manager Daemons (MGR). |
332 |
|
333 |
### `nftables::rules::ceph_mon` |
334 |
|
335 |
Ceph is a distributed object store and file system. |
336 |
Enable this option to support Ceph's Monitor Daemon. |
337 |
|
338 |
#### Parameters |
339 |
|
340 |
The following parameters are available in the `nftables::rules::ceph_mon` class. |
341 |
|
342 |
##### `ports` |
343 |
|
344 |
Data type: `Array[Stdlib::Port,1]` |
345 |
|
346 |
|
347 |
|
348 |
Default value: `[3300, 6789]` |
349 |
|
350 |
### `nftables::rules::dhcpv6_client` |
351 |
|
352 |
The nftables::rules::dhcpv6_client class. |
353 |
|
354 |
### `nftables::rules::dns` |
355 |
|
356 |
manage in dns |
357 |
|
358 |
#### Parameters |
359 |
|
360 |
The following parameters are available in the `nftables::rules::dns` class. |
361 |
|
362 |
##### `ports` |
363 |
|
364 |
Data type: `Array[Stdlib::Port,1]` |
365 |
|
366 |
|
367 |
|
368 |
Default value: `[53]` |
369 |
|
370 |
### `nftables::rules::http` |
371 |
|
372 |
manage in http |
373 |
|
374 |
### `nftables::rules::https` |
375 |
|
376 |
manage in https |
377 |
|
378 |
### `nftables::rules::icinga2` |
379 |
|
380 |
manage in icinga2 |
381 |
|
382 |
#### Parameters |
383 |
|
384 |
The following parameters are available in the `nftables::rules::icinga2` class. |
385 |
|
386 |
##### `ports` |
387 |
|
388 |
Data type: `Array[Stdlib::Port,1]` |
389 |
|
390 |
|
391 |
|
392 |
Default value: `[5665]` |
393 |
|
394 |
### `nftables::rules::icmp` |
395 |
|
396 |
The nftables::rules::icmp class. |
397 |
|
398 |
#### Parameters |
399 |
|
400 |
The following parameters are available in the `nftables::rules::icmp` class. |
401 |
|
402 |
##### `v4_types` |
403 |
|
404 |
Data type: `Optional[Array[String]]` |
405 |
|
406 |
|
407 |
|
408 |
Default value: ``undef`` |
409 |
|
410 |
##### `v6_types` |
411 |
|
412 |
Data type: `Optional[Array[String]]` |
413 |
|
414 |
|
415 |
|
416 |
Default value: ``undef`` |
417 |
|
418 |
##### `order` |
419 |
|
420 |
Data type: `String` |
421 |
|
422 |
|
423 |
|
424 |
Default value: `'10'` |
425 |
|
426 |
### `nftables::rules::nfs` |
427 |
|
428 |
manage in nfs4 |
429 |
|
430 |
### `nftables::rules::nfs3` |
431 |
|
432 |
manage in nfs3 |
433 |
|
434 |
### `nftables::rules::node_exporter` |
435 |
|
436 |
manage in node exporter |
437 |
|
438 |
#### Parameters |
439 |
|
440 |
The following parameters are available in the `nftables::rules::node_exporter` class. |
441 |
|
442 |
##### `prometheus_server` |
443 |
|
444 |
Data type: `Optional[Variant[String,Array[String,1]]]` |
445 |
|
446 |
|
447 |
|
448 |
Default value: ``undef`` |
449 |
|
450 |
##### `port` |
451 |
|
452 |
Data type: `Stdlib::Port` |
453 |
|
454 |
|
455 |
|
456 |
Default value: `9100` |
457 |
|
458 |
### `nftables::rules::ospf` |
459 |
|
460 |
manage in ospf |
461 |
|
462 |
### `nftables::rules::ospf3` |
463 |
|
464 |
manage in ospf3 |
465 |
|
466 |
### `nftables::rules::out::all` |
467 |
|
468 |
allow all outbound |
469 |
|
470 |
### `nftables::rules::out::ceph_client` |
471 |
|
472 |
Ceph is a distributed object store and file system. |
473 |
Enable this to be a client of Ceph's Monitor (MON), |
474 |
Object Storage Daemons (OSD), Metadata Server Daemons (MDS), |
475 |
and Manager Daemons (MGR). |
476 |
|
477 |
#### Parameters |
478 |
|
479 |
The following parameters are available in the `nftables::rules::out::ceph_client` class. |
480 |
|
481 |
##### `ports` |
482 |
|
483 |
Data type: `Array[Stdlib::Port,1]` |
484 |
|
485 |
|
486 |
|
487 |
Default value: `[3300, 6789]` |
488 |
|
489 |
### `nftables::rules::out::chrony` |
490 |
|
491 |
manage out chrony |
492 |
|
493 |
### `nftables::rules::out::dhcp` |
494 |
|
495 |
manage out dhcp |
496 |
|
497 |
### `nftables::rules::out::dhcpv6_client` |
498 |
|
499 |
The nftables::rules::out::dhcpv6_client class. |
500 |
|
501 |
### `nftables::rules::out::dns` |
502 |
|
503 |
manage out dns |
504 |
|
505 |
#### Parameters |
506 |
|
507 |
The following parameters are available in the `nftables::rules::out::dns` class. |
508 |
|
509 |
##### `dns_server` |
510 |
|
511 |
Data type: `Optional[Variant[String,Array[String,1]]]` |
512 |
|
513 |
|
514 |
|
515 |
Default value: ``undef`` |
516 |
|
517 |
### `nftables::rules::out::http` |
518 |
|
519 |
manage out http |
520 |
|
521 |
### `nftables::rules::out::https` |
522 |
|
523 |
manage out https |
524 |
|
525 |
### `nftables::rules::out::icmp` |
526 |
|
527 |
The nftables::rules::out::icmp class. |
528 |
|
529 |
#### Parameters |
530 |
|
531 |
The following parameters are available in the `nftables::rules::out::icmp` class. |
532 |
|
533 |
##### `v4_types` |
534 |
|
535 |
Data type: `Optional[Array[String]]` |
536 |
|
537 |
|
538 |
|
539 |
Default value: ``undef`` |
540 |
|
541 |
##### `v6_types` |
542 |
|
543 |
Data type: `Optional[Array[String]]` |
544 |
|
545 |
|
546 |
|
547 |
Default value: ``undef`` |
548 |
|
549 |
##### `order` |
550 |
|
551 |
Data type: `String` |
552 |
|
553 |
|
554 |
|
555 |
Default value: `'10'` |
556 |
|
557 |
### `nftables::rules::out::kerberos` |
558 |
|
559 |
allows outbound access for kerberos |
560 |
|
561 |
### `nftables::rules::out::mysql` |
562 |
|
563 |
manage out mysql |
564 |
|
565 |
### `nftables::rules::out::nfs` |
566 |
|
567 |
manage out nfs |
568 |
|
569 |
### `nftables::rules::out::nfs3` |
570 |
|
571 |
manage out nfs3 |
572 |
|
573 |
### `nftables::rules::out::openafs_client` |
574 |
|
575 |
7000 - afs3-fileserver |
576 |
7002 - afs3-ptserver |
577 |
7003 - vlserver |
578 |
|
579 |
* **See also** |
580 |
* https://wiki.openafs.org/devel/AFSServicePorts/ |
581 |
* AFS Service Ports |
582 |
|
583 |
#### Parameters |
584 |
|
585 |
The following parameters are available in the `nftables::rules::out::openafs_client` class. |
586 |
|
587 |
##### `ports` |
588 |
|
589 |
Data type: `Array[Stdlib::Port,1]` |
590 |
|
591 |
|
592 |
|
593 |
Default value: `[7000, 7002, 7003]` |
594 |
|
595 |
### `nftables::rules::out::ospf` |
596 |
|
597 |
manage out ospf |
598 |
|
599 |
### `nftables::rules::out::ospf3` |
600 |
|
601 |
manage out ospf3 |
602 |
|
603 |
### `nftables::rules::out::postgres` |
604 |
|
605 |
manage out postgres |
606 |
|
607 |
### `nftables::rules::out::puppet` |
608 |
|
609 |
manage outgoing puppet |
610 |
|
611 |
#### Parameters |
612 |
|
613 |
The following parameters are available in the `nftables::rules::out::puppet` class. |
614 |
|
615 |
##### `puppetserver` |
616 |
|
617 |
Data type: `Variant[Stdlib::IP::Address,Array[Stdlib::IP::Address,1]]` |
618 |
|
619 |
|
620 |
|
621 |
##### `puppetserver_port` |
622 |
|
623 |
Data type: `Stdlib::Port` |
624 |
|
625 |
|
626 |
|
627 |
Default value: `8140` |
628 |
|
629 |
### `nftables::rules::out::smtp` |
630 |
|
631 |
manage out smtp |
632 |
|
633 |
### `nftables::rules::out::ssh` |
634 |
|
635 |
manage out ssh |
636 |
|
637 |
### `nftables::rules::out::ssh::remove` |
638 |
|
639 |
disable outgoing ssh |
640 |
|
641 |
### `nftables::rules::out::tor` |
642 |
|
643 |
manage out tor |
644 |
|
645 |
### `nftables::rules::out::wireguard` |
646 |
|
647 |
manage out wireguard |
648 |
|
649 |
#### Parameters |
650 |
|
651 |
The following parameters are available in the `nftables::rules::out::wireguard` class. |
652 |
|
653 |
##### `ports` |
654 |
|
655 |
Data type: `Array[Integer,1]` |
656 |
|
657 |
|
658 |
|
659 |
Default value: `[51820]` |
660 |
|
661 |
### `nftables::rules::puppet` |
662 |
|
663 |
manage in puppet |
664 |
|
665 |
#### Parameters |
666 |
|
667 |
The following parameters are available in the `nftables::rules::puppet` class. |
668 |
|
669 |
##### `ports` |
670 |
|
671 |
Data type: `Array[Integer,1]` |
672 |
|
673 |
|
674 |
|
675 |
Default value: `[8140]` |
676 |
|
677 |
### `nftables::rules::smtp` |
678 |
|
679 |
manage in smtp |
680 |
|
681 |
### `nftables::rules::smtp_submission` |
682 |
|
683 |
manage in smtp submission |
684 |
|
685 |
### `nftables::rules::smtps` |
686 |
|
687 |
manage in smtps |
688 |
|
689 |
### `nftables::rules::ssh` |
690 |
|
691 |
manage in ssh |
692 |
|
693 |
#### Parameters |
694 |
|
695 |
The following parameters are available in the `nftables::rules::ssh` class. |
696 |
|
697 |
##### `ports` |
698 |
|
699 |
Data type: `Array[Stdlib::Port,1]` |
700 |
|
701 |
|
702 |
|
703 |
Default value: `[22]` |
704 |
|
705 |
### `nftables::rules::tor` |
706 |
|
707 |
manage in tor |
708 |
|
709 |
#### Parameters |
710 |
|
711 |
The following parameters are available in the `nftables::rules::tor` class. |
712 |
|
713 |
##### `ports` |
714 |
|
715 |
Data type: `Array[Stdlib::Port,1]` |
716 |
|
717 |
|
718 |
|
719 |
Default value: `[9001]` |
720 |
|
721 |
### `nftables::rules::wireguard` |
722 |
|
723 |
manage in wireguard |
724 |
|
725 |
#### Parameters |
726 |
|
727 |
The following parameters are available in the `nftables::rules::wireguard` class. |
728 |
|
729 |
##### `ports` |
730 |
|
731 |
Data type: `Array[Stdlib::Port,1]` |
732 |
|
733 |
|
734 |
|
735 |
Default value: `[51820]` |
736 |
|
737 |
### `nftables::services::dhcpv6_client` |
738 |
|
739 |
The nftables::services::dhcpv6_client class. |
740 |
|
741 |
### `nftables::services::openafs_client` |
742 |
|
743 |
The nftables::services::openafs_client class. |
744 |
|
745 |
## Defined types |
746 |
|
747 |
### `nftables::chain` |
748 |
|
749 |
manage a chain |
750 |
|
751 |
#### Parameters |
752 |
|
753 |
The following parameters are available in the `nftables::chain` defined type. |
754 |
|
755 |
##### `table` |
756 |
|
757 |
Data type: `Pattern[/^(ip|ip6|inet)-[a-zA-Z0-9_]+$/]` |
758 |
|
759 |
|
760 |
|
761 |
Default value: `'inet-filter'` |
762 |
|
763 |
##### `chain` |
764 |
|
765 |
Data type: `Pattern[/^[a-zA-Z0-9_]+$/]` |
766 |
|
767 |
|
768 |
|
769 |
Default value: `$title` |
770 |
|
771 |
##### `inject` |
772 |
|
773 |
Data type: `Optional[Pattern[/^\d\d-[a-zA-Z0-9_]+$/]]` |
774 |
|
775 |
|
776 |
|
777 |
Default value: ``undef`` |
778 |
|
779 |
##### `inject_iif` |
780 |
|
781 |
Data type: `Optional[String]` |
782 |
|
783 |
|
784 |
|
785 |
Default value: ``undef`` |
786 |
|
787 |
##### `inject_oif` |
788 |
|
789 |
Data type: `Optional[String]` |
790 |
|
791 |
|
792 |
|
793 |
Default value: ``undef`` |
794 |
|
795 |
### `nftables::config` |
796 |
|
797 |
manage a config snippet |
798 |
|
799 |
#### Parameters |
800 |
|
801 |
The following parameters are available in the `nftables::config` defined type. |
802 |
|
803 |
##### `tablespec` |
804 |
|
805 |
Data type: `Pattern[/^\w+-\w+$/]` |
806 |
|
807 |
|
808 |
|
809 |
Default value: `$title` |
810 |
|
811 |
##### `content` |
812 |
|
813 |
Data type: `Optional[String]` |
814 |
|
815 |
|
816 |
|
817 |
Default value: ``undef`` |
818 |
|
819 |
##### `source` |
820 |
|
821 |
Data type: `Optional[Variant[String,Array[String,1]]]` |
822 |
|
823 |
|
824 |
|
825 |
Default value: ``undef`` |
826 |
|
827 |
##### `prefix` |
828 |
|
829 |
Data type: `String` |
830 |
|
831 |
|
832 |
|
833 |
Default value: `'custom-'` |
834 |
|
835 |
### `nftables::rule` |
836 |
|
837 |
manage a chain rule |
838 |
Name should be: |
839 |
CHAIN_NAME-rulename |
840 |
|
841 |
#### Parameters |
842 |
|
843 |
The following parameters are available in the `nftables::rule` defined type. |
844 |
|
845 |
##### `ensure` |
846 |
|
847 |
Data type: `Enum['present','absent']` |
848 |
|
849 |
|
850 |
|
851 |
Default value: `'present'` |
852 |
|
853 |
##### `rulename` |
854 |
|
855 |
Data type: `Nftables::RuleName` |
856 |
|
857 |
|
858 |
|
859 |
Default value: `$title` |
860 |
|
861 |
##### `order` |
862 |
|
863 |
Data type: `Pattern[/^\d\d$/]` |
864 |
|
865 |
|
866 |
|
867 |
Default value: `'50'` |
868 |
|
869 |
##### `table` |
870 |
|
871 |
Data type: `Optional[String]` |
872 |
|
873 |
|
874 |
|
875 |
Default value: `'inet-filter'` |
876 |
|
877 |
##### `content` |
878 |
|
879 |
Data type: `Optional[String]` |
880 |
|
881 |
|
882 |
|
883 |
Default value: ``undef`` |
884 |
|
885 |
##### `source` |
886 |
|
887 |
Data type: `Optional[Variant[String,Array[String,1]]]` |
888 |
|
889 |
|
890 |
|
891 |
Default value: ``undef`` |
892 |
|
893 |
### `nftables::rules::dnat4` |
894 |
|
895 |
manage a ipv4 dnat rule |
896 |
|
897 |
#### Parameters |
898 |
|
899 |
The following parameters are available in the `nftables::rules::dnat4` defined type. |
900 |
|
901 |
##### `daddr` |
902 |
|
903 |
Data type: `Pattern[/^[12]?\d{1,2}\.[12]?\d{1,2}\.[12]?\d{1,2}\.[12]?\d{1,2}$/]` |
904 |
|
905 |
|
906 |
|
907 |
##### `port` |
908 |
|
909 |
Data type: `Variant[String,Stdlib::Port]` |
910 |
|
911 |
|
912 |
|
913 |
##### `rulename` |
914 |
|
915 |
Data type: `Pattern[/^[a-zA-Z0-9_]+$/]` |
916 |
|
917 |
|
918 |
|
919 |
Default value: `$title` |
920 |
|
921 |
##### `order` |
922 |
|
923 |
Data type: `Pattern[/^\d\d$/]` |
924 |
|
925 |
|
926 |
|
927 |
Default value: `'50'` |
928 |
|
929 |
##### `chain` |
930 |
|
931 |
Data type: `String[1]` |
932 |
|
933 |
|
934 |
|
935 |
Default value: `'default_fwd'` |
936 |
|
937 |
##### `iif` |
938 |
|
939 |
Data type: `Optional[String[1]]` |
940 |
|
941 |
|
942 |
|
943 |
Default value: ``undef`` |
944 |
|
945 |
##### `proto` |
946 |
|
947 |
Data type: `Enum['tcp','udp']` |
948 |
|
949 |
|
950 |
|
951 |
Default value: `'tcp'` |
952 |
|
953 |
##### `dport` |
954 |
|
955 |
Data type: `Optional[Variant[String,Stdlib::Port]]` |
956 |
|
957 |
|
958 |
|
959 |
Default value: `''` |
960 |
|
961 |
##### `ensure` |
962 |
|
963 |
Data type: `Enum['present','absent']` |
964 |
|
965 |
|
966 |
|
967 |
Default value: `'present'` |
968 |
|
969 |
### `nftables::rules::masquerade` |
970 |
|
971 |
masquerade all outgoing traffic |
972 |
|
973 |
#### Parameters |
974 |
|
975 |
The following parameters are available in the `nftables::rules::masquerade` defined type. |
976 |
|
977 |
##### `rulename` |
978 |
|
979 |
Data type: `Pattern[/^[a-zA-Z0-9_]+$/]` |
980 |
|
981 |
|
982 |
|
983 |
Default value: `$title` |
984 |
|
985 |
##### `order` |
986 |
|
987 |
Data type: `Pattern[/^\d\d$/]` |
988 |
|
989 |
|
990 |
|
991 |
Default value: `'70'` |
992 |
|
993 |
##### `chain` |
994 |
|
995 |
Data type: `String[1]` |
996 |
|
997 |
|
998 |
|
999 |
Default value: `'POSTROUTING'` |
1000 |
|
1001 |
##### `oif` |
1002 |
|
1003 |
Data type: `Optional[String[1]]` |
1004 |
|
1005 |
|
1006 |
|
1007 |
Default value: ``undef`` |
1008 |
|
1009 |
##### `saddr` |
1010 |
|
1011 |
Data type: `Optional[String[1]]` |
1012 |
|
1013 |
|
1014 |
|
1015 |
Default value: ``undef`` |
1016 |
|
1017 |
##### `daddr` |
1018 |
|
1019 |
Data type: `Optional[String[1]]` |
1020 |
|
1021 |
|
1022 |
|
1023 |
Default value: ``undef`` |
1024 |
|
1025 |
##### `proto` |
1026 |
|
1027 |
Data type: `Optional[Enum['tcp','udp']]` |
1028 |
|
1029 |
|
1030 |
|
1031 |
Default value: ``undef`` |
1032 |
|
1033 |
##### `dport` |
1034 |
|
1035 |
Data type: `Optional[Variant[String,Stdlib::Port]]` |
1036 |
|
1037 |
|
1038 |
|
1039 |
Default value: ``undef`` |
1040 |
|
1041 |
##### `ensure` |
1042 |
|
1043 |
Data type: `Enum['present','absent']` |
1044 |
|
1045 |
|
1046 |
|
1047 |
Default value: `'present'` |
1048 |
|
1049 |
### `nftables::rules::snat4` |
1050 |
|
1051 |
manage a ipv4 snat rule |
1052 |
|
1053 |
#### Parameters |
1054 |
|
1055 |
The following parameters are available in the `nftables::rules::snat4` defined type. |
1056 |
|
1057 |
##### `snat` |
1058 |
|
1059 |
Data type: `String[1]` |
1060 |
|
1061 |
|
1062 |
|
1063 |
##### `rulename` |
1064 |
|
1065 |
Data type: `Pattern[/^[a-zA-Z0-9_]+$/]` |
1066 |
|
1067 |
|
1068 |
|
1069 |
Default value: `$title` |
1070 |
|
1071 |
##### `order` |
1072 |
|
1073 |
Data type: `Pattern[/^\d\d$/]` |
1074 |
|
1075 |
|
1076 |
|
1077 |
Default value: `'70'` |
1078 |
|
1079 |
##### `chain` |
1080 |
|
1081 |
Data type: `String[1]` |
1082 |
|
1083 |
|
1084 |
|
1085 |
Default value: `'POSTROUTING'` |
1086 |
|
1087 |
##### `oif` |
1088 |
|
1089 |
Data type: `Optional[String[1]]` |
1090 |
|
1091 |
|
1092 |
|
1093 |
Default value: ``undef`` |
1094 |
|
1095 |
##### `saddr` |
1096 |
|
1097 |
Data type: `Optional[String[1]]` |
1098 |
|
1099 |
|
1100 |
|
1101 |
Default value: ``undef`` |
1102 |
|
1103 |
##### `proto` |
1104 |
|
1105 |
Data type: `Optional[Enum['tcp','udp']]` |
1106 |
|
1107 |
|
1108 |
|
1109 |
Default value: ``undef`` |
1110 |
|
1111 |
##### `dport` |
1112 |
|
1113 |
Data type: `Optional[Variant[String,Stdlib::Port]]` |
1114 |
|
1115 |
|
1116 |
|
1117 |
Default value: ``undef`` |
1118 |
|
1119 |
##### `ensure` |
1120 |
|
1121 |
Data type: `Enum['present','absent']` |
1122 |
|
1123 |
|
1124 |
|
1125 |
Default value: `'present'` |
1126 |
|
1127 |
### `nftables::set` |
1128 |
|
1129 |
manage a named set |
1130 |
|
1131 |
#### Examples |
1132 |
|
1133 |
##### simple set |
1134 |
|
1135 |
```puppet |
1136 |
nftables::set{'my_set': |
1137 |
type => 'ipv4_addr', |
1138 |
flags => ['interval'], |
1139 |
elements => ['192.168.0.1/24', '10.0.0.2'], |
1140 |
auto_merge => true, |
1141 |
} |
1142 |
``` |
1143 |
|
1144 |
#### Parameters |
1145 |
|
1146 |
The following parameters are available in the `nftables::set` defined type. |
1147 |
|
1148 |
##### `ensure` |
1149 |
|
1150 |
Data type: `Enum['present','absent']` |
1151 |
|
1152 |
should the set be created. |
1153 |
|
1154 |
Default value: `'present'` |
1155 |
|
1156 |
##### `setname` |
1157 |
|
1158 |
Data type: `Pattern[/^[-a-zA-Z0-9_]+$/]` |
1159 |
|
1160 |
name of set, equal to to title. |
1161 |
|
1162 |
Default value: `$title` |
1163 |
|
1164 |
##### `order` |
1165 |
|
1166 |
Data type: `Pattern[/^\d\d$/]` |
1167 |
|
1168 |
concat ordering. |
1169 |
|
1170 |
Default value: `'10'` |
1171 |
|
1172 |
##### `type` |
1173 |
|
1174 |
Data type: `Optional[Enum['ipv4_addr', 'ipv6_addr', 'ether_addr', 'inet_proto', 'inet_service', 'mark']]` |
1175 |
|
1176 |
type of set. |
1177 |
|
1178 |
Default value: ``undef`` |
1179 |
|
1180 |
##### `table` |
1181 |
|
1182 |
Data type: `String` |
1183 |
|
1184 |
table to add set to. |
1185 |
|
1186 |
Default value: `'inet-filter'` |
1187 |
|
1188 |
##### `flags` |
1189 |
|
1190 |
Data type: `Array[Enum['constant', 'dynamic', 'interval', 'timeout'], 0, 4]` |
1191 |
|
1192 |
specify flags for set |
1193 |
|
1194 |
Default value: `[]` |
1195 |
|
1196 |
##### `timeout` |
1197 |
|
1198 |
Data type: `Optional[Integer]` |
1199 |
|
1200 |
timeout in seconds |
1201 |
|
1202 |
Default value: ``undef`` |
1203 |
|
1204 |
##### `gc_interval` |
1205 |
|
1206 |
Data type: `Optional[Integer]` |
1207 |
|
1208 |
garbage collection interval. |
1209 |
|
1210 |
Default value: ``undef`` |
1211 |
|
1212 |
##### `elements` |
1213 |
|
1214 |
Data type: `Optional[Array[String]]` |
1215 |
|
1216 |
initialize the set with some elements in it. |
1217 |
|
1218 |
Default value: ``undef`` |
1219 |
|
1220 |
##### `size` |
1221 |
|
1222 |
Data type: `Optional[Integer]` |
1223 |
|
1224 |
limits the maximum number of elements of the set. |
1225 |
|
1226 |
Default value: ``undef`` |
1227 |
|
1228 |
##### `policy` |
1229 |
|
1230 |
Data type: `Optional[Enum['performance', 'memory']]` |
1231 |
|
1232 |
determines set selection policy. |
1233 |
|
1234 |
Default value: ``undef`` |
1235 |
|
1236 |
##### `auto_merge` |
1237 |
|
1238 |
Data type: `Boolean` |
1239 |
|
1240 |
? |
1241 |
|
1242 |
Default value: ``false`` |
1243 |
|
1244 |
##### `content` |
1245 |
|
1246 |
Data type: `Optional[String]` |
1247 |
|
1248 |
specify content of set. |
1249 |
|
1250 |
Default value: ``undef`` |
1251 |
|
1252 |
##### `source` |
1253 |
|
1254 |
Data type: `Optional[Variant[String,Array[String,1]]]` |
1255 |
|
1256 |
specify source of set. |
1257 |
|
1258 |
Default value: ``undef`` |
1259 |
|
1260 |
### `nftables::simplerule` |
1261 |
|
1262 |
Provides a simplified interface to nftables::rule |
1263 |
|
1264 |
#### Examples |
1265 |
|
1266 |
##### allow incoming traffic from port 541 on port 543 TCP to a given IP range and count packets |
1267 |
|
1268 |
```puppet |
1269 |
nftables::simplerule{'my_service_in': |
1270 |
action => 'accept', |
1271 |
comment => 'allow traffic to port 543', |
1272 |
counter => true, |
1273 |
proto => 'tcp', |
1274 |
dport => 543, |
1275 |
daddr => '2001:1458::/32', |
1276 |
sport => 541, |
1277 |
} |
1278 |
``` |
1279 |
|
1280 |
#### Parameters |
1281 |
|
1282 |
The following parameters are available in the `nftables::simplerule` defined type. |
1283 |
|
1284 |
##### `ensure` |
1285 |
|
1286 |
Data type: `Enum['present','absent']` |
1287 |
|
1288 |
Should the rule be created. |
1289 |
|
1290 |
Default value: `'present'` |
1291 |
|
1292 |
##### `rulename` |
1293 |
|
1294 |
Data type: `Nftables::SimpleRuleName` |
1295 |
|
1296 |
The symbolic name for the rule to add. Defaults to the resource's title. |
1297 |
|
1298 |
Default value: `$title` |
1299 |
|
1300 |
##### `order` |
1301 |
|
1302 |
Data type: `Pattern[/^\d\d$/]` |
1303 |
|
1304 |
A number representing the order of the rule. |
1305 |
|
1306 |
Default value: `'50'` |
1307 |
|
1308 |
##### `chain` |
1309 |
|
1310 |
Data type: `String` |
1311 |
|
1312 |
The name of the chain to add this rule to. |
1313 |
|
1314 |
Default value: `'default_in'` |
1315 |
|
1316 |
##### `table` |
1317 |
|
1318 |
Data type: `String` |
1319 |
|
1320 |
The name of the table to add this rule to. |
1321 |
|
1322 |
Default value: `'inet-filter'` |
1323 |
|
1324 |
##### `action` |
1325 |
|
1326 |
Data type: `Enum['accept', 'continue', 'drop', 'queue', 'return']` |
1327 |
|
1328 |
The verdict for the matched traffic. |
1329 |
|
1330 |
Default value: `'accept'` |
1331 |
|
1332 |
##### `comment` |
1333 |
|
1334 |
Data type: `Optional[String]` |
1335 |
|
1336 |
A typically human-readable comment for the rule. |
1337 |
|
1338 |
Default value: ``undef`` |
1339 |
|
1340 |
##### `dport` |
1341 |
|
1342 |
Data type: `Optional[Nftables::Port]` |
1343 |
|
1344 |
The destination port, ports or port range. |
1345 |
|
1346 |
Default value: ``undef`` |
1347 |
|
1348 |
##### `proto` |
1349 |
|
1350 |
Data type: `Optional[Enum['tcp', 'tcp4', 'tcp6', 'udp', 'udp4', 'udp6']]` |
1351 |
|
1352 |
The transport-layer protocol to match. |
1353 |
|
1354 |
Default value: ``undef`` |
1355 |
|
1356 |
##### `daddr` |
1357 |
|
1358 |
Data type: `Optional[Nftables::Addr]` |
1359 |
|
1360 |
The destination address, CIDR or set to match. |
1361 |
|
1362 |
Default value: ``undef`` |
1363 |
|
1364 |
##### `set_type` |
1365 |
|
1366 |
Data type: `Enum['ip', 'ip6']` |
1367 |
|
1368 |
When using sets as saddr or daddr, the type of the set. |
1369 |
Use `ip` for sets of type `ipv4_addr`. |
1370 |
|
1371 |
Default value: `'ip6'` |
1372 |
|
1373 |
##### `sport` |
1374 |
|
1375 |
Data type: `Optional[Nftables::Port]` |
1376 |
|
1377 |
The source port, ports or port range. |
1378 |
|
1379 |
Default value: ``undef`` |
1380 |
|
1381 |
##### `saddr` |
1382 |
|
1383 |
Data type: `Optional[Nftables::Addr]` |
1384 |
|
1385 |
The source address, CIDR or set to match. |
1386 |
|
1387 |
Default value: ``undef`` |
1388 |
|
1389 |
##### `counter` |
1390 |
|
1391 |
Data type: `Boolean` |
1392 |
|
1393 |
Enable traffic counters for the matched traffic. |
1394 |
|
1395 |
Default value: ``false`` |
1396 |
|
1397 |
## Data types |
1398 |
|
1399 |
### `Nftables::Addr` |
1400 |
|
1401 |
Represents an address expression to be used within a rule. |
1402 |
|
1403 |
Alias of `Variant[Stdlib::IP::Address::V6, Stdlib::IP::Address::V4, Nftables::Addr::Set]` |
1404 |
|
1405 |
### `Nftables::Addr::Set` |
1406 |
|
1407 |
Represents a set expression to be used within a rule. |
1408 |
|
1409 |
Alias of `Pattern[/^@[-a-zA-Z0-9_]+$/]` |
1410 |
|
1411 |
### `Nftables::Port` |
1412 |
|
1413 |
Represents a port expression to be used within a rule. |
1414 |
|
1415 |
Alias of `Variant[Array[Stdlib::Port, 1], Stdlib::Port, Nftables::Port::Range]` |
1416 |
|
1417 |
### `Nftables::Port::Range` |
1418 |
|
1419 |
Represents a port range expression to be used within a rule. |
1420 |
|
1421 |
Alias of `Pattern[/^\d+-\d+$/]` |
1422 |
|
1423 |
### `Nftables::RuleName` |
1424 |
|
1425 |
Represents a rule name to be used in a raw rule created via nftables::rule. |
1426 |
It's a dash separated string. The first component describes the chain to |
1427 |
add the rule to, the second the rule name and the (optional) third a number. |
1428 |
Ex: 'default_in-sshd', 'default_out-my_service-2'. |
1429 |
|
1430 |
Alias of `Pattern[/^[a-zA-Z0-9_]+-[a-zA-Z0-9_]+(-\d+)?$/]` |
1431 |
|
1432 |
### `Nftables::SimpleRuleName` |
1433 |
|
1434 |
Represents a simple rule name to be used in a rule created via nftables::simplerule |
1435 |
|
1436 |
Alias of `Pattern[/^[a-zA-Z0-9_]+(-\d+)?$/]` |
1437 |
|