Puppet module to configure a Freifunk (Hamburg) Gateway
Find a file
2014-06-22 22:41:53 +02:00
data Bird/Bird6: Add Ostholstein1 peering 2014-06-06 00:59:54 +02:00
files extend ff_gw::vpn for hideme support 2014-06-22 22:03:10 +02:00
manifests vpn: fix cert/username params and conditions 2014-06-22 22:41:53 +02:00
templates/etc DHCP: Announce this gateway and srv01 as DNS servers 2014-06-02 09:38:18 +02:00
Modulefile bump version to 0.3.0 2014-05-20 11:23:45 +02:00
README.md extend ff_gw::vpn for hideme support 2014-06-22 22:03:10 +02:00

Freifunk Gateway Module

Martin Schütte info@mschuette.name

This module tries to automate the configuration of a Freifunk (Hamburg) Gateway. The idea is to implement the step-by-step guide on http://wiki.freifunk.net/Freifunk_Hamburg/Gateway

A generalization for other communities would be nice, but right now this is all experimental and we will be glad when it works for our own gateways.

Also note that this is a really ugly puppet module that ignores all principles of modularity and interoperability; instead it follows the "Big ball of mud" design pattern.

Open Problems

  • The apt repository at http://bird.network.cz/debian/ does not use PGP signatures, so bird and bird6 will not be installed automatically.
  • Setting the hostname should occur before everything else. So either do that manually or run a small ff_gw::sysadmin-only manifest before the main ff_gw manifest.
  • User root requires ssh access to the git repository git@freifunk-gw01.hamburg.ccc.de:fastdkeys -- so create a key and have it authorized beforehand.

Usage

Install as a puppet module, then include with node-specific parameters.

Dependencies

Install Puppet and some required modules with:

apt-get install puppet git
puppet module install puppetlabs-stdlib
puppet module install puppetlabs-apt
puppet module install puppetlabs-vcsrepo
puppet module install saz-sudo
puppet module install torrancew-account

Then add this module (which is not in the puppet forge, so it has to be downloaded manually):

cd /etc/puppet/modules
git clone https://github.com/freifunkhamburg/puppet-ff_gw.git ff_gw

Parameters

Now include the module in your manifest and provide all parameters. Basically there are three kinds of parameters: user accounts (optional if you do manual user management), network config (has to be in sync with the wiki page), and credentials for fastd and openvpn.

Example puppet code (save e.g. as /etc/puppet/gw.pp):


class { 'ff_gw::sysadmin':
    # both optional, used for FFHH monitoring:
    zabbixserver => 'argos.mschuette.name',
    muninserver  => '78.47.49.236',

    # optional, configure hostname and public IP
    sethostname => 'gw12.hamburg.freifunk.net',
    setip       => '5.45.105.34',

    # also optional, let puppet control user accounts:
    accounts => {
        mschuett => {
            comment => 'Martin Schuette',
            ssh_key => 'AAAAB3NzaC1yc2EAAAADAQABAAABAQC4qcAOjmLCv+DaF405K9/napCQCq8qJnTJtkbeQR+PGLHAR3kxXFh5rQXKp5n3IxEhZt4js7yin5EBmfCMv+CHYSndT4BGVDarjqIoM7RAKI8MyJUus0SOf5WsnAGamp97mCh8iWHg7v+emqYcF308FFkubKzFLdHjdLGZBCduClUvkyuuUc7vtkXZ3IkInXGkrN5hn388/lHsT1ewUva7j2fZmbVou8P2FHC4+azPInoyezwiIE6YrFKAyquDhuFRDir5QqlFaZpD6C8T+vEiqWRyqPxI7YVGBudh2oec5m99VTWkrPw7cOsC92ndLAgQ2MjxEeDhPh/Tgxly6flb',
            groups => ['sudo', 'users'],
        }
    },
}

class { 'ff_gw':
    # freifunk config
    # the network assigned to the ff community
    ff_net          => '10.112.0.0/16',
    # the network actually used in the mesh might be smaller than ff_net
    ff_mesh_net     => '10.112.0.0/18',
    # as number for icvpn peering
    ff_as           => '65112',

    # network config (example data for gw12)
    mesh_mac        => 'de:ad:be:ef:01:14',
    gw_ipv4         => '10.112.30.1',
    gw_ipv6         => 'fd51:2bb2:fd0d::501',
    dhcprange_start => '10.112.30.2',
    dhcprange_end   => '10.112.31.254',

    # only for inter-city VPN hosts
	gw_do_ic_peering => true,
	tinc_name        => 'hamburg01',
	tinc_keyfile     => '/etc/tinc/rsa_key.priv',
	ic_vpn_ip4       => '10.207.X.Y',
	ic_vpn_ip6       => 'fec0::a:cf:X:Y',

    # secret credentials for fastd and vpn
    secret_key      => '...',
    vpn_ca_crt      => '-----BEGIN CERTIFICATE-----
MIIE ...
-----END CERTIFICATE-----',
    vpn_usr_crt     => '-----BEGIN CERTIFICATE-----
MIIE ...
-----END CERTIFICATE-----',
    vpn_usr_key     => '-----BEGIN PRIVATE KEY-----
MIIE ...
-----END PRIVATE KEY-----',
}

Run Puppet

To apply the puppet manifest (e.g. saved as gw.pp) run:

puppet apply --verbose gw.pp

The verbose flag is optional and shows all changes. To be even more catious you can also add the --noop flag to only show changes but not apply them.

VPN providers

The example above is written for a mullvad VPN using X.509 authentication.

For hide.me with username/password auth use:

class { 'ff_gw':
    # ...
	vpn_provider => 'hideme',
	vpn_usr_name => 'username',
	vpn_usr_pass => 'vpn_password',
    vpn_ca_crt   => '-----BEGIN CERTIFICATE-----
MIIE ...
-----END CERTIFICATE-----',