# Freifunk Gateway Module Martin Schütte This module tries to automate the configuration of a Freifunk (Hamburg) Gateway. The idea is to implement the step-by-step guide on http://wiki.freifunk.net/Freifunk_Hamburg/Gateway A generalization for other communities would be nice, but right now this is all experimental and we will be glad when it works for our own gateways. Also note that this is a really ugly puppet module that ignores all principles of modularity and interoperability; instead it follows the "Big ball of mud" design pattern. ## Usage Install as a puppet module, then include with node-specific parameters. ### Dependencies Install Puppet and some required modules with: ``` apt-get install puppet puppet module install puppetlabs-stdlib puppet module install puppetlabs-apt puppet module install puppetlabs-vcsrepo puppet module install saz-sudo puppet module install torrancew-account ``` Then add this module (which is not in the puppet forge, so it has to be downloaded manually): ``` cd /etc/puppet/modules git clone https://github.com/freifunkhamburg/puppet-ff_gw.git ff_gw ``` ### Parameters Now include the module in your manifest and provide all parameters. Basically there are three kinds of parameters: user accounts (optional if you do manual user management), network config (has to be in sync with the wiki page), and credentials for fastd and openvpn. Example puppet code (save e.g. as `/etc/puppet/gw.pp`): ``` class { 'ff_gw::sysadmin': # both optional, used for FFHH monitoring: zabbixserver => 'argos.mschuette.name', muninserver => '78.47.49.236', # optional, configure hostname and public IP sethostname => 'gw12.hamburg.freifunk.net', setip => '5.45.105.34', # also optional, let puppet control user accounts: accounts => { mschuett => { comment => 'Martin Schuette', ssh_key => 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC4qcAOjmLCv+DaF405K9/napCQCq8qJnTJtkbeQR+PGLHAR3kxXFh5rQXKp5n3IxEhZt4js7yin5EBmfCMv+CHYSndT4BGVDarjqIoM7RAKI8MyJUus0SOf5WsnAGamp97mCh8iWHg7v+emqYcF308FFkubKzFLdHjdLGZBCduClUvkyuuUc7vtkXZ3IkInXGkrN5hn388/lHsT1ewUva7j2fZmbVou8P2FHC4+azPInoyezwiIE6YrFKAyquDhuFRDir5QqlFaZpD6C8T+vEiqWRyqPxI7YVGBudh2oec5m99VTWkrPw7cOsC92ndLAgQ2MjxEeDhPh/Tgxly6flb', groups => ['sudo', 'users'], } }, } class { 'ff_gw': # freifunk config # the network assigned to the ff community ff_net => '10.112.0.0/16', # the network actually used in the mesh might be smaller than ff_net ff_mesh_net => '10.112.0.0/18', # as number for icvpn peering ff_as => '65112', # network config (example data for gw12) mesh_mac => 'de:ad:be:ef:01:14', gw_ipv4 => '10.112.30.1', gw_ipv6 => 'fd51:2bb2:fd0d::501', dhcprange_start => '10.112.30.2', dhcprange_end => '10.112.31.254', # secret credentials for fastd and vpn secret_key => '...', vpn_ca_crt => '-----BEGIN CERTIFICATE----- MIIE ... -----END CERTIFICATE-----', vpn_usr_crt => '-----BEGIN CERTIFICATE----- MIIE ... -----END CERTIFICATE-----', vpn_usr_key => '-----BEGIN PRIVATE KEY----- MIIE ... -----END PRIVATE KEY-----', } ``` ### Run Puppet To apply the puppet manifest (e.g. saved as `gw.pp`) run: ``` puppet apply --verbose gw.pp ``` The verbose flag is optional and shows all changes. To be even more catious you can also add the `--noop` flag to only show changes but not apply them.