Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
slapos slapos
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Labels
    • Labels
  • Merge requests 124
    • Merge requests 124
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Environments
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value Stream
  • Snippets
    • Snippets
  • Members
    • Members
  • Activity
  • Graph
  • Jobs
  • Commits
Collapse sidebar
  • nexedi
  • slaposslapos
  • Merge requests
  • !930

Merged
Created Mar 05, 2021 by Łukasz Nowak@lukeMaintainer22 of 23 tasks completed22/23 tasks

Feature/kvm whitelist firewall

  • Overview 3
  • Commits 3
  • Pipelines 39
  • Changes 12

Tasks:

  • support cluster
  • support resilient
  • tests
  • define whitelist-domains-default
  • (lazy/later) setup https://stream.nxdcdn.com/rapidspace-whitelist-domains

Dependencies:

  • !950 (merged)
  • slapos.toolbox!94 (merged):
    • merge
    • release
    • pin here
  • slapos.core!285 (merged):
    • merge
    • release
    • pin here

Spec:

  • have some hardcoded domains (debian.org, ubuntu.org)
  • fetch additional domains from https://stream.nxdcdn.com/rapidspace-whitelist-domains
  • accept whitelist-domains parameter from the request
  • merge all
  • produce list of IPs from the domains by using command provided in slapos.toolbox!94 (merged)
  • put the list of produced IPs into .slapos-firewall-whitelist

Then additional slapos manager shall read the list and if present allow only connections to that destinations from the VM.

Requirements:

  • async download of the list
  • async update of the firewall, maybe used with promise (check that list of wanted IPs matches the list of configured ones, or something else)
  • the whitelist-firewall slapos manager (another story)
  • test up to .slapos-firewall-whitelist or even more, if some kind of additional communication to reload manager is required

Found issues:

  • need to open widely 53/udp for DNS resolution, maybe just query /etc/resolv.conf and allow ips there?
    • solved by using local /etc/resolve.conf parsing to find acceptable good DNS server
Edited Apr 09, 2021 by Łukasz Nowak
Assignee
Assign to
Reviewer
Request review from
None
Milestone
None
Assign milestone
Time tracking
Source branch: feature/kvm-whitelist-firewall
GitLab Nexedi Edition | About GitLab | About Nexedi | 沪ICP备2021021310号-2 | 沪ICP备2021021310号-7