firewall: use watch-outputs to track changes in zone->interface map
includes a horrible hack to work around (claimed (by me)) deficiencies in the nftables parser
This commit is contained in:
parent
929226ed9e
commit
6649ebeccd
@ -5,6 +5,9 @@
|
|||||||
nftables,
|
nftables,
|
||||||
writeFennel,
|
writeFennel,
|
||||||
anoia,
|
anoia,
|
||||||
|
svc,
|
||||||
|
lua,
|
||||||
|
output-template,
|
||||||
lualinux,
|
lualinux,
|
||||||
linotify,
|
linotify,
|
||||||
}:
|
}:
|
||||||
@ -18,14 +21,18 @@ let
|
|||||||
inherit (lib.attrsets) mapAttrs' nameValuePair mapAttrsToList;
|
inherit (lib.attrsets) mapAttrs' nameValuePair mapAttrsToList;
|
||||||
inherit (lib.strings) concatStringsSep;
|
inherit (lib.strings) concatStringsSep;
|
||||||
inherit (lib.lists) flatten;
|
inherit (lib.lists) flatten;
|
||||||
|
inherit (builtins) concatLists attrValues;
|
||||||
|
inherit (liminix) outputRef;
|
||||||
mkSet =
|
mkSet =
|
||||||
family: name:
|
family: name:
|
||||||
nameValuePair "${name}-set-${family}" {
|
nameValuePair "${name}-set-${family}" {
|
||||||
kind = "set";
|
kind = "set";
|
||||||
inherit name family;
|
inherit name family;
|
||||||
type = "ifname";
|
type = "ifname";
|
||||||
|
elements = map (s: "{{ output(${builtins.toJSON s}, \"ifname\", \"\") }}") zones.${name};
|
||||||
};
|
};
|
||||||
sets = (mapAttrs' (n: _: mkSet "ip" n) zones) // (mapAttrs' (n: _: mkSet "ip6" n) zones);
|
sets = (mapAttrs' (n: _: mkSet "ip" n) zones) //
|
||||||
|
(mapAttrs' (n: _: mkSet "ip6" n) zones);
|
||||||
allRules = lib.recursiveUpdate extraRules (lib.recursiveUpdate (builtins.trace sets sets) rules);
|
allRules = lib.recursiveUpdate extraRules (lib.recursiveUpdate (builtins.trace sets sets) rules);
|
||||||
script = firewallgen "firewall1.nft" allRules;
|
script = firewallgen "firewall1.nft" allRules;
|
||||||
ifwatch = writeFennel "ifwatch" {
|
ifwatch = writeFennel "ifwatch" {
|
||||||
@ -37,13 +44,26 @@ let
|
|||||||
mainFunction = "run";
|
mainFunction = "run";
|
||||||
} ./ifwatch.fnl;
|
} ./ifwatch.fnl;
|
||||||
watchArg = z: intfs: map (i: "${z}:${i}/.outputs") intfs;
|
watchArg = z: intfs: map (i: "${z}:${i}/.outputs") intfs;
|
||||||
in
|
|
||||||
longrun {
|
|
||||||
name = "firewall";
|
name = "firewall";
|
||||||
|
service = longrun {
|
||||||
|
inherit name;
|
||||||
run = ''
|
run = ''
|
||||||
${script}
|
mkdir -p /run/${name}; in_outputs ${name}
|
||||||
PATH=${nftables}/bin:$PATH
|
# exec > /dev/console 2>&1
|
||||||
${ifwatch} ${concatStringsSep " " (flatten (mapAttrsToList watchArg zones))}
|
echo RESTARTING FIREWALL >/dev/console
|
||||||
|
PATH=${nftables}/bin:${lua}/bin:$PATH
|
||||||
|
${output-template}/bin/output-template '{{' '}}' < ${script} | lua -e 'for x in io.lines() do if not string.match(x, "elements = {%s+}") then print(x) end; end' > /run/${name}/fw.nft
|
||||||
|
# cat /run/${name}/fw.nft > /dev/console
|
||||||
|
nft -f /run/${name}/fw.nft
|
||||||
|
while sleep 86400 ; do : ; done
|
||||||
'';
|
'';
|
||||||
finish = "${nftables}/bin/nft flush ruleset";
|
finish = "${nftables}/bin/nft flush ruleset";
|
||||||
|
};
|
||||||
|
in
|
||||||
|
svc.secrets.subscriber.build {
|
||||||
|
watch =
|
||||||
|
concatLists
|
||||||
|
(mapAttrsToList (_zone : services : map (s: outputRef s "ifname") services) zones);
|
||||||
|
|
||||||
|
inherit service;
|
||||||
}
|
}
|
||||||
|
@ -13,12 +13,11 @@
|
|||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
inherit (liminix.services) oneshot longrun;
|
inherit (liminix.services) oneshot longrun;
|
||||||
inherit (builtins) length head toString;
|
inherit (builtins) map length head toString;
|
||||||
inherit (lib) unique optional optionals;
|
inherit (lib) unique optional optionals concatStringsSep;
|
||||||
inherit (service) name;
|
inherit (service) name;
|
||||||
|
|
||||||
watched-services = unique (map (f: f "service") watch);
|
watched-services = unique (map (f: f "service") watch);
|
||||||
paths = unique (map (f: f "path") watch);
|
|
||||||
|
|
||||||
restart-flag =
|
restart-flag =
|
||||||
{
|
{
|
||||||
@ -35,17 +34,11 @@ let
|
|||||||
}
|
}
|
||||||
.${action};
|
.${action};
|
||||||
|
|
||||||
watched-service =
|
|
||||||
if length watched-services == 0 then
|
|
||||||
null
|
|
||||||
else if length watched-services == 1 then
|
|
||||||
head watched-services
|
|
||||||
else
|
|
||||||
throw "cannot subscribe to more than one source service for secrets";
|
|
||||||
|
|
||||||
watcher =
|
watcher =
|
||||||
let
|
let
|
||||||
name' = "restart-${name}";
|
name' = "restart-${name}";
|
||||||
|
refs = concatStringsSep " "
|
||||||
|
(map (s: "${s "service"}:${s "path"}") watch);
|
||||||
in
|
in
|
||||||
longrun {
|
longrun {
|
||||||
name = name';
|
name = name';
|
||||||
@ -55,16 +48,16 @@ let
|
|||||||
if test -e $dir/notification-fd; then flag="-U"; else flag="-u"; fi
|
if test -e $dir/notification-fd; then flag="-U"; else flag="-u"; fi
|
||||||
${s6}/bin/s6-svwait $flag /run/service/${name} || exit
|
${s6}/bin/s6-svwait $flag /run/service/${name} || exit
|
||||||
PATH=${s6-rc}/bin:${s6}/bin:$PATH
|
PATH=${s6-rc}/bin:${s6}/bin:$PATH
|
||||||
${watch-outputs}/bin/watch-outputs ${restart-flag} ${name} ${watched-service.name} ${lib.concatStringsSep " " paths}
|
${watch-outputs}/bin/watch-outputs ${restart-flag} ${name} ${refs}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
service.overrideAttrs (o: {
|
service.overrideAttrs (o: {
|
||||||
buildInputs = (lim.orEmpty o.buildInputs) ++ optional (watched-service != null) watcher;
|
buildInputs = (lim.orEmpty o.buildInputs) ++ optional (watch != []) watcher;
|
||||||
dependencies =
|
dependencies =
|
||||||
(lim.orEmpty o.dependencies)
|
(lim.orEmpty o.dependencies)
|
||||||
++ optionals (watched-service != null) [
|
# ++ optionals
|
||||||
watcher
|
# (watch != [])
|
||||||
watched-service
|
# ([ watcher ] ++ watched-services);
|
||||||
];
|
;
|
||||||
})
|
})
|
||||||
|
@ -61,7 +61,7 @@ let
|
|||||||
''
|
''
|
||||||
set ${name} {
|
set ${name} {
|
||||||
type ${type}
|
type ${type}
|
||||||
${if elements != [ ] then "elements = { ${concatStringsSep ", " elements} }" else ""}
|
${if elements != [ ] then "elements = { ${concatStringsSep ", " (builtins.trace elements elements)} }" else ""}
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
@ -25,9 +25,9 @@
|
|||||||
myenv {
|
myenv {
|
||||||
: string
|
: string
|
||||||
:output
|
:output
|
||||||
(fn [service-path path]
|
(fn [service-path path default]
|
||||||
(let [s (assert (svc.open (.. service-path "/.outputs")))]
|
(let [s (assert (svc.open (.. service-path "/.outputs")))]
|
||||||
(s:output path)))
|
(or (s:output path) default)))
|
||||||
:lua_quote #(string.format "%q" %1)
|
:lua_quote #(string.format "%q" %1)
|
||||||
:json_quote (fn [x] (.. "\"" (json-escape x) "\""))
|
:json_quote (fn [x] (.. "\"" (json-escape x) "\""))
|
||||||
}]
|
}]
|
||||||
|
@ -21,6 +21,7 @@ stdenv.mkDerivation {
|
|||||||
nativeBuildInputs = [ fennelrepl ] ;
|
nativeBuildInputs = [ fennelrepl ] ;
|
||||||
|
|
||||||
buildPhase = ''
|
buildPhase = ''
|
||||||
|
fennelrepl --test ./watch-outputs.fnl
|
||||||
cp -p ${
|
cp -p ${
|
||||||
writeFennel name {
|
writeFennel name {
|
||||||
packages = [
|
packages = [
|
||||||
@ -29,6 +30,7 @@ stdenv.mkDerivation {
|
|||||||
linotify
|
linotify
|
||||||
fennel
|
fennel
|
||||||
];
|
];
|
||||||
|
macros = [ anoia.dev ];
|
||||||
mainFunction = "run";
|
mainFunction = "run";
|
||||||
} ./watch-outputs.fnl
|
} ./watch-outputs.fnl
|
||||||
} ${name}
|
} ${name}
|
||||||
|
@ -1,10 +1,18 @@
|
|||||||
(local { : %% : system : assoc : split : table= : dig } (require :anoia))
|
(local { : %% : system : assoc : split : table= : dig } (require :anoia))
|
||||||
(local svc (require :anoia.svc))
|
(local svc (require :anoia.svc))
|
||||||
(local { : kill } (require :lualinux))
|
(local { : kill &as ll} (require :lualinux))
|
||||||
|
(import-macros { : define-tests : expect : expect= } :anoia.assert)
|
||||||
|
|
||||||
(fn split-paths [paths]
|
(local { : view } (require :fennel))
|
||||||
(icollect [_ path (ipairs paths)]
|
|
||||||
(split "/" path)))
|
(fn output-refs [outputs]
|
||||||
|
(let [result {}]
|
||||||
|
(each [_ v (ipairs outputs)]
|
||||||
|
(let [[service path] (split ":" v)
|
||||||
|
paths (or (. result service) [])]
|
||||||
|
(table.insert paths (split "/" path ))
|
||||||
|
(tset result service paths)))
|
||||||
|
result))
|
||||||
|
|
||||||
(fn parse-args [args]
|
(fn parse-args [args]
|
||||||
(match args
|
(match args
|
||||||
@ -17,37 +25,73 @@
|
|||||||
["-s" signal service & rest] (assoc (parse-args rest)
|
["-s" signal service & rest] (assoc (parse-args rest)
|
||||||
:controlled-service service
|
:controlled-service service
|
||||||
:action [:signal signal])
|
:action [:signal signal])
|
||||||
[watched-service & paths] { : watched-service
|
outputs { :output-references (output-refs outputs) } ))
|
||||||
:paths (split-paths paths)
|
|
||||||
}))
|
(define-tests
|
||||||
|
(expect= (parse-args ["-r" "daemon"
|
||||||
|
"/nix/store/s1:out1"
|
||||||
|
"/nix/store/s2:out1" "/nix/store/s2:out2/ifname"])
|
||||||
|
{:action "restart"
|
||||||
|
:controlled-service "daemon"
|
||||||
|
:output-references
|
||||||
|
{"/nix/store/s1" [["out1"]]
|
||||||
|
"/nix/store/s2" [["out1"] ["out2" "ifname"]]}}
|
||||||
|
))
|
||||||
|
|
||||||
|
|
||||||
(fn changed? [paths old-tree new-tree]
|
(fn changed? [paths old-tree new-tree]
|
||||||
(accumulate [changed? false
|
(accumulate [changed? false
|
||||||
_ path (ipairs paths)]
|
_ path (ipairs paths)]
|
||||||
(or changed? (not (table= (dig old-tree path) (dig new-tree path))))))
|
(or changed? (not (table= (dig old-tree path) (dig new-tree path))))))
|
||||||
|
|
||||||
|
(define-tests
|
||||||
|
(expect (changed? [["ifname"]] {:ifname "true"} {:ifindex 2}))
|
||||||
|
(expect (changed? [["ifname"]] {:ifname "true"} {:ifname "false"}))
|
||||||
|
(expect (not (changed? [["ifname"]] {:ifname "true"} {:ifname "true"})))
|
||||||
|
(expect (not (changed? [["mtu"]] {:ifname "true"} {:ifname "false"})))
|
||||||
|
(expect (not (changed? [["mtu"]] {:ifname "true"} {:ifname "false"})))
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
(fn do-action [action service]
|
(fn do-action [action service]
|
||||||
(case action
|
(case action
|
||||||
:restart (system (%% "s6-svc -r /run/service/%s" service))
|
:restart (system (%% "s6-svc -r /run/service/%s" service))
|
||||||
:restart-all (system (%% "s6-rc -b -d %q; s6-rc-up-tree %q" service service))
|
:restart-all (system (%% "s6-rc -b -d %q; s6-rc-up-tree %q" service service))
|
||||||
[:signal n] (system (%% "s6-svc -s %d /run/service/%s" n service))))
|
[:signal n] (system (%% "s6-svc -s %d /run/service/%s" n service))))
|
||||||
|
|
||||||
|
(local POLLIN 0x0001)
|
||||||
|
(local POLLHUP 0x0010)
|
||||||
|
|
||||||
|
(fn wait-for-change [services]
|
||||||
|
(let [pollfds (collect [s _p (ipairs services)]
|
||||||
|
(bor (lshift (s:fileno) 32)
|
||||||
|
(lshift (bor POLLIN POLLHUP) 16)))]
|
||||||
|
(ll.poll pollfds)))
|
||||||
|
|
||||||
|
(fn open-services [output-references]
|
||||||
|
(collect [s p (pairs output-references)]
|
||||||
|
(values (assert (svc.open (.. s "/.outputs"))) p)))
|
||||||
|
|
||||||
(fn run []
|
(fn run []
|
||||||
(let [{
|
(let [trees {}
|
||||||
|
{
|
||||||
|
: output-references
|
||||||
: controlled-service
|
: controlled-service
|
||||||
: action
|
: action
|
||||||
: watched-service
|
: watched-service
|
||||||
: paths } (parse-args arg)
|
: paths } (parse-args arg)]
|
||||||
dir (.. watched-service "/.outputs")
|
(while true
|
||||||
service (assert (svc.open dir))]
|
(let [services (open-services output-references)
|
||||||
(print (%% "watching %q" watched-service))
|
trees (collect [s _ (pairs services)]
|
||||||
(accumulate [tree (service:output ".")
|
(values s (s:output ".")))]
|
||||||
v (service:events)]
|
(wait-for-change services)
|
||||||
|
(each [service paths (pairs services)]
|
||||||
(let [new-tree (service:output ".")]
|
(let [new-tree (service:output ".")]
|
||||||
(when (changed? paths tree new-tree)
|
(when (changed? paths (. trees service) new-tree)
|
||||||
(print "watched path event:" action controlled-service)
|
(print "watched path event:" action controlled-service)
|
||||||
(do-action action controlled-service))
|
(do-action action controlled-service))))))))
|
||||||
new-tree))))
|
|
||||||
|
|
||||||
|
|
||||||
{ : run }
|
{ : run }
|
||||||
|
@ -17,6 +17,7 @@ while { $FINISHED < 10 } {
|
|||||||
}
|
}
|
||||||
set FINISHED [ expr $FINISHED + 1 ]
|
set FINISHED [ expr $FINISHED + 1 ]
|
||||||
}
|
}
|
||||||
|
expect "#READY#"
|
||||||
send "nft list set ip table-ip wan || touch /non/existent\n"
|
send "nft list set ip table-ip wan || touch /non/existent\n"
|
||||||
expect {
|
expect {
|
||||||
"ppp0" { puts "ppp0 found " }
|
"ppp0" { puts "ppp0 found " }
|
||||||
|
Loading…
Reference in New Issue
Block a user