
This patch adds a driver for FWaaS V2 support in the NSX-V plugin. It supports setting firewall rules per router interface port on the router edge firewall. In addition, the FWaaS TVD driver will now support NSX-V as well. The driver code is a combination of the NSX-V3 FWaas-V2 code, and the old NSX-V FWaaS-V1 code that is being deleted. Change-Id: Iacc7eaff0c70b68156516008cf0277c154edd76b
94 lines
3.7 KiB
Python
94 lines
3.7 KiB
Python
# Copyright 2017 VMware, Inc.
|
|
# All Rights Reserved
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import abc
|
|
|
|
from oslo_log import helpers as log_helpers
|
|
from oslo_log import log as logging
|
|
|
|
from neutron_lib.exceptions import firewall_v2 as exceptions
|
|
|
|
try:
|
|
from neutron_fwaas.services.firewall.service_drivers.agents.drivers \
|
|
import fwaas_base
|
|
except ImportError:
|
|
# FWaaS project no found
|
|
from vmware_nsx.services.fwaas.common import fwaas_mocks \
|
|
as fwaas_base
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class EdgeFwaasDriverBaseV2(fwaas_base.FwaasDriverBase):
|
|
"""NSX Base driver for Firewall As A Service - V2."""
|
|
|
|
def __init__(self, driver_name):
|
|
super(EdgeFwaasDriverBaseV2, self).__init__()
|
|
self.driver_name = driver_name
|
|
|
|
@log_helpers.log_method_call
|
|
def create_firewall_group(self, agent_mode, apply_list, firewall_group):
|
|
"""Create the Firewall with a given policy. """
|
|
self._validate_firewall_group(firewall_group)
|
|
self._update_backend_routers(apply_list, firewall_group['id'])
|
|
|
|
@log_helpers.log_method_call
|
|
def update_firewall_group(self, agent_mode, apply_list, firewall_group):
|
|
"""Remove previous policy and apply the new policy."""
|
|
self._validate_firewall_group(firewall_group)
|
|
self._update_backend_routers(apply_list, firewall_group['id'])
|
|
|
|
@log_helpers.log_method_call
|
|
def delete_firewall_group(self, agent_mode, apply_list, firewall_group):
|
|
"""Delete firewall.
|
|
|
|
Removes rules created by this instance from the backend firewall
|
|
And add the default allow rule.
|
|
"""
|
|
self._update_backend_routers(apply_list, firewall_group['id'])
|
|
|
|
@log_helpers.log_method_call
|
|
def apply_default_policy(self, agent_mode, apply_list, firewall_group):
|
|
"""Apply the default policy (deny all).
|
|
|
|
The backend firewall always has this policy (=deny all) as default,
|
|
so we only need to delete the current rules.
|
|
"""
|
|
self._update_backend_routers(apply_list, firewall_group['id'])
|
|
|
|
@abc.abstractmethod
|
|
def _update_backend_routers(self, apply_list, fwg_id):
|
|
"""Update all the affected router on the backend"""
|
|
pass
|
|
|
|
def _validate_firewall_group(self, firewall_group):
|
|
"""Validate the rules in the firewall group"""
|
|
for rule in firewall_group['egress_rule_list']:
|
|
if rule.get('source_ip_address'):
|
|
# this rule cannot be used as egress rule
|
|
LOG.error("Rule %(id)s cannot be used in an egress "
|
|
"policy because it has a source",
|
|
{'id': rule['id']})
|
|
raise exceptions.FirewallInternalDriverError(
|
|
driver=self.driver_name)
|
|
for rule in firewall_group['ingress_rule_list']:
|
|
if rule.get('destination_ip_address'):
|
|
# this rule cannot be used as ingress rule
|
|
LOG.error("Rule %(id)s cannot be used in an ingress "
|
|
"policy because it has a destination",
|
|
{'id': rule['id']})
|
|
raise exceptions.FirewallInternalDriverError(
|
|
driver=self.driver_name)
|