Esempio n. 1
0
    def should_apply_firewall_to_router(self, router_data):
        """Return True if the firewall rules should be added the router

        Return False in those cases:
        - router without an external gateway (rule may be added later when
                                              there is a gateway)

        Raise an exception if the router is unsupported:
        - shared router (not supported)
        - md proxy router (not supported)

        """
        if (not router_data.get('distributed')
                and router_data.get('router_type') == 'shared'):
            LOG.error("Cannot apply firewall to shared router %s",
                      router_data['id'])
            raise exceptions.FirewallInternalDriverError(
                driver=FWAAS_DRIVER_NAME)

        if router_data.get('name', '').startswith('metadata_proxy_router'):
            LOG.error("Cannot apply firewall to the metadata proxy router %s",
                      router_data['id'])
            raise exceptions.FirewallInternalDriverError(
                driver=FWAAS_DRIVER_NAME)

        if not router_data.get('external_gateway_info'):
            LOG.info("Cannot apply firewall to router %s with no gateway",
                     router_data['id'])
            return False

        return True
Esempio n. 2
0
    def _get_backend_router_and_fw_section(self, context, router_id):
        # find the backend router id in the DB
        nsx_router_id = nsx_db.get_nsx_router_id(context.session, router_id)
        if nsx_router_id is None:
            LOG.error("Didn't find nsx router for router %s", router_id)
            raise exceptions.FirewallInternalDriverError(
                driver=FWAAS_DRIVER_NAME)

        # get the FW section id of the backend router
        try:
            section_id = self.nsx_router.get_firewall_section_id(nsx_router_id)
        except Exception as e:
            LOG.error(
                "Failed to find router firewall section for router "
                "%(id)s: %(e)s", {
                    'id': router_id,
                    'e': e
                })
            raise exceptions.FirewallInternalDriverError(
                driver=FWAAS_DRIVER_NAME)
        if section_id is None:
            LOG.error(
                "Failed to find router firewall section for router "
                "%(id)s.", {'id': router_id})
            raise exceptions.FirewallInternalDriverError(
                driver=FWAAS_DRIVER_NAME)

        return nsx_router_id, section_id
Esempio n. 3
0
    def apply_default_policy(self, agent_mode, apply_list, firewall):
        LOG.debug('Applying firewall %(fw_id)s for tenant %(tid)s',
                  {'fw_id': firewall['id'], 'tid': firewall['tenant_id']})
        fwid = firewall['id']
        try:
            for router_info in apply_list:
                ipt_if_prefix_list = self._get_ipt_mgrs_with_if_prefix(
                    agent_mode, router_info)
                for ipt_if_prefix in ipt_if_prefix_list:
                    # the following only updates local memory; no hole in FW
                    ipt_mgr = ipt_if_prefix['ipt']
                    self._remove_chains(fwid, ipt_mgr)
                    self._remove_default_chains(ipt_mgr)

                    # create default 'DROP ALL' policy chain
                    self._add_default_policy_chain_v4v6(ipt_mgr)
                    self._enable_policy_chain(fwid, ipt_if_prefix)

                    # apply the changes immediately (no defer in firewall path)
                    ipt_mgr.defer_apply_off()
        except (LookupError, RuntimeError):
            # catch known library exc and raise Fwaas generic exception
            LOG.exception(
                _LE("Failed to apply default policy on firewall: %s"), fwid)
            raise exc.FirewallInternalDriverError(driver=FWAAS_DRIVER_NAME)
Esempio n. 4
0
 def create_firewall(self, agent_mode, apply_list, firewall):
     LOG.debug('Creating firewall %(fw_id)s for tenant %(tid)s',
               {'fw_id': firewall['id'], 'tid': firewall['tenant_id']})
     try:
         if firewall['admin_state_up']:
             self._setup_firewall(agent_mode, apply_list, firewall)
             self._remove_conntrack_new_firewall(agent_mode,
                                                 apply_list, firewall)
             self.pre_firewall = dict(firewall)
         else:
             self.apply_default_policy(agent_mode, apply_list, firewall)
     except (LookupError, RuntimeError):
         # catch known library exc and raise Fwaas generic exception
         LOG.exception(_LE("Failed to create firewall: %s"), firewall['id'])
         raise exc.FirewallInternalDriverError(driver=FWAAS_DRIVER_NAME)
Esempio n. 5
0
 def delete_firewall(self, agent_mode, apply_list, firewall):
     LOG.debug('Deleting firewall %(fw_id)s for tenant %(tid)s',
               {'fw_id': firewall['id'], 'tid': firewall['tenant_id']})
     fwid = firewall['id']
     try:
         for router_info in apply_list:
             ipt_if_prefix_list = self._get_ipt_mgrs_with_if_prefix(
                 agent_mode, router_info)
             for ipt_if_prefix in ipt_if_prefix_list:
                 ipt_mgr = ipt_if_prefix['ipt']
                 self._remove_chains(fwid, ipt_mgr)
                 self._remove_default_chains(ipt_mgr)
                 # apply the changes immediately (no defer in firewall path)
                 ipt_mgr.defer_apply_off()
         self.pre_firewall = None
     except (LookupError, RuntimeError):
         # catch known library exc and raise Fwaas generic exception
         LOG.exception(_LE("Failed to delete firewall: %s"), fwid)
         raise exc.FirewallInternalDriverError(driver=FWAAS_DRIVER_NAME)
Esempio n. 6
0
 def _translate_action(fwaas_action, fwaas_rule_id):
     """Translate FWaaS action to NSX action"""
     if fwaas_action == fwaas_consts.FWAAS_ALLOW:
         return consts.FW_ACTION_ALLOW
     if fwaas_action == fwaas_consts.FWAAS_DENY:
         return consts.FW_ACTION_DROP
     if fwaas_action == fwaas_consts.FWAAS_REJECT:
         # reject is not supported by the nsx router firewall
         LOG.warning(
             "Reject action is not supported by the NSX backend "
             "for router firewall. Using %(action)s instead for "
             "rule %(id)s", {
                 'action': consts.FW_ACTION_DROP,
                 'id': fwaas_rule_id
             })
         return consts.FW_ACTION_DROP
     # Unexpected action
     LOG.error("Unsupported FWAAS action %(action)s for rule %(id)s", {
         'action': fwaas_action,
         'id': fwaas_rule_id
     })
     raise exceptions.FirewallInternalDriverError(driver=FWAAS_DRIVER_NAME)
Esempio n. 7
0
    def _set_rules_on_router_edge(self,
                                  context,
                                  router_id,
                                  neutron_id,
                                  edge_id,
                                  fw_id,
                                  translated_rules,
                                  delete_fw=False):
        """Recreate router edge firewall rules

        Using the plugin code to recreate all the rules with the additional
        FWaaS rules.

        router_id is the is of the router about to be updated
            (in case of distributed router - the plr)
        neutron_id is the neutron router id
        """
        # update the backend
        router_db = self.core_plugin._get_router(context, neutron_id)
        try:
            with locking.LockManager.get_lock(str(edge_id)):
                self.core_plugin.update_router_firewall(
                    context,
                    router_id,
                    router_db,
                    fwaas_rules=translated_rules)
        except Exception as e:
            # catch known library exceptions and raise Fwaas generic exception
            LOG.error(
                "Failed to update firewall %(fw)s on edge %(edge_id)s: "
                "%(e)s", {
                    'e': e,
                    'fw': fw_id,
                    'edge_id': edge_id
                })
            raise exceptions.FirewallInternalDriverError(
                driver=FWAAS_DRIVER_NAME)
Esempio n. 8
0
 def validate_backend_version(self):
     # prevent firewall actions if the backend does not support it
     if not self.backend_support:
         LOG.error("The NSX backend does not support router firewall")
         raise exceptions.FirewallInternalDriverError(
             driver=FWAAS_DRIVER_NAME)