@@ -18,7 +18,7 @@ stackhpc_firewalld_zones: |
18
18
{% set _ = network_zones.append({'zone': network | net_zone }) %}
19
19
{% endif %}
20
20
{% endfor %}
21
- {{ network_zones }}
21
+ {{ network_zones | unique }}
22
22
23
23
# A templated list of firewalld rules, according to the enabled services,
24
24
# host's group membership, and host's network configuration.
@@ -29,7 +29,7 @@ stackhpc_firewalld_rules: |
29
29
{% for rule in stackhpc_firewalld_rules_unverified | unique %}
30
30
{% if rule | ansible.utils.remove_keys('state') in stackhpc_firewalld_rules_verified | map('ansible.utils.remove_keys', 'state') %}
31
31
{% set stackhpc_firewalld_rules_verified = 'Invalid configuration! Two matching firewalld rules probably exist with different states' + 1 %}
32
- {% elif rule.network in network_interfaces and rule.network | net_zone is not none %}
32
+ {% elif rule.network in network_interfaces and rule.network | net_zone %}
33
33
{% set _ = stackhpc_firewalld_rules_verified.append(rule) %}
34
34
{% endif %}
35
35
{% endfor %}
@@ -56,7 +56,7 @@ stackhpc_common_firewalld_rules: "{{ stackhpc_common_firewalld_rules_default + s
56
56
stackhpc_common_firewalld_rules_default: |
57
57
{% set stackhpc_common_firewalld_rules_formatted = [] %}
58
58
{% for ruleset in stackhpc_common_firewalld_rules_template %}
59
- {% if ruleset.enabled %}
59
+ {% if ruleset.enabled | bool %}
60
60
{% for rule in ruleset.rules %}
61
61
{% set _ = stackhpc_common_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
62
62
{% endfor %}
@@ -78,12 +78,12 @@ stackhpc_common_firewalld_rules_template:
78
78
- service: dhcpv6-client
79
79
network: "{{ public_net_name }}"
80
80
state: disabled
81
- enabled: "{{ public_net_name | net_zone in stackhpc_firewalld_zones }}"
81
+ enabled: "{{ {'zone': public_net_name | net_zone} in firewalld_zones }}"
82
82
- rules:
83
83
- service: ssh
84
84
network: "{{ public_net_name }}"
85
85
state: disabled
86
- enabled: "{{ public_net_name | net_zone in stackhpc_firewalld_zones and admin_oc_net_name | net_zone != public_net_name | net_zone }}"
86
+ enabled: "{{ {'zone': 'public' | net_zone} in firewalld_zones and admin_oc_net_name | net_zone != public_net_name | net_zone }}"
87
87
88
88
stackhpc_common_firewalld_rules_extra: []
89
89
@@ -95,7 +95,7 @@ stackhpc_controller_firewalld_rules: "{{ stackhpc_controller_firewalld_rules_def
95
95
stackhpc_controller_firewalld_rules_default: |
96
96
{% set stackhpc_controller_firewalld_rules_formatted = [] %}
97
97
{% for ruleset in stackhpc_controller_firewalld_rules_template %}
98
- {% if ruleset.enabled %}
98
+ {% if ruleset.enabled | bool %}
99
99
{% for rule in ruleset.rules %}
100
100
{% set _ = stackhpc_controller_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
101
101
{% endfor %}
@@ -126,7 +126,7 @@ stackhpc_controller_firewalld_rules_template:
126
126
- service: tftp
127
127
network: "{{ provision_wl_net_name }}"
128
128
state: enabled
129
- enabled: "{{ kolla_enable_ironic }}"
129
+ enabled: "{{ kolla_enable_ironic | bool }}"
130
130
# Designate
131
131
- rules:
132
132
- port: 53/tcp
@@ -142,39 +142,6 @@ stackhpc_controller_firewalld_rules_template:
142
142
network: "{{ public_net_name }}"
143
143
state: enabled
144
144
enabled: "{{ kolla_enable_designate | bool }}"
145
- # Vault & Consul
146
- - rules:
147
- - port: 8200/tcp
148
- network: "{{ internal_net_name }}"
149
- state: enabled
150
- - port: 8300/tcp
151
- network: "{{ internal_net_name }}"
152
- state: enabled
153
- - port: 8301/tcp
154
- network: "{{ internal_net_name }}"
155
- state: enabled
156
- - port: 8301/udp
157
- network: "{{ internal_net_name }}"
158
- state: enabled
159
- - port: 8302/tcp
160
- network: "{{ internal_net_name }}"
161
- state: enabled
162
- - port: 8302/udp
163
- network: "{{ internal_net_name }}"
164
- state: enabled
165
- - port: 8500/tcp
166
- network: "{{ internal_net_name }}"
167
- state: enabled
168
- - port: 8501/tcp
169
- network: "{{ internal_net_name }}"
170
- state: enabled
171
- - port: 8600/tcp
172
- network: "{{ internal_net_name }}"
173
- state: enabled
174
- - port: 8600/udp
175
- network: "{{ internal_net_name }}"
176
- state: enabled
177
- enabled: true # FIXME add condition
178
145
# GENEVE
179
146
- rules:
180
147
- port: 6081/udp
@@ -190,7 +157,7 @@ stackhpc_controller_firewalld_rules_template:
190
157
# Octavia
191
158
- rules:
192
159
- port: 5555/udp
193
- network: "{{ octavia_net_name }}"
160
+ network: "{{ octavia_net_name | default(public_net_name) }}"
194
161
state: enabled
195
162
enabled: "{{ kolla_enable_octavia | bool }}"
196
163
@@ -204,9 +171,9 @@ stackhpc_compute_firewalld_rules: "{{ stackhpc_compute_firewalld_rules_default +
204
171
stackhpc_compute_firewalld_rules_default: |
205
172
{% set stackhpc_compute_firewalld_rules_formatted = [] %}
206
173
{% for ruleset in stackhpc_compute_firewalld_rules_template %}
207
- {% if ruleset.enabled %}
174
+ {% if ruleset.enabled | bool %}
208
175
{% for rule in ruleset.rules %}
209
- {% if rule.network in network_interfaces and rule.network | net_zone is not none %}
176
+ {% if rule.network in network_interfaces and rule.network | net_zone %}
210
177
{% set _ = stackhpc_compute_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
211
178
{% endif %}
212
179
{% endfor %}
@@ -238,9 +205,9 @@ stackhpc_storage_firewalld_rules: "{{ stackhpc_storage_firewalld_rules_default +
238
205
stackhpc_storage_firewalld_rules_default: |
239
206
{% set stackhpc_storage_firewalld_rules_formatted = [] %}
240
207
{% for ruleset in stackhpc_storage_firewalld_rules_template %}
241
- {% if ruleset.enabled %}
208
+ {% if ruleset.enabled | bool %}
242
209
{% for rule in ruleset.rules %}
243
- {% if rule.network in network_interfaces and rule.network | net_zone is not none %}
210
+ {% if rule.network in network_interfaces and rule.network | net_zone %}
244
211
{% set _ = stackhpc_storage_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
245
212
{% endif %}
246
213
{% endfor %}
@@ -254,7 +221,7 @@ stackhpc_storage_firewalld_rules_template:
254
221
- port: 9283/tcp
255
222
network: "{{ provision_oc_net_name }}"
256
223
state: enabled
257
- enabled: "{{ kolla_enable_prometheus_ceph_mgr_exporter and 'mgrs' in group_names }}"
224
+ enabled: "{{ kolla_enable_prometheus_ceph_mgr_exporter | bool | default(false) and 'mgrs' in group_names }}"
258
225
# Ceph
259
226
- rules:
260
227
- service: ceph
@@ -278,9 +245,9 @@ stackhpc_monitoring_firewalld_rules: "{{ stackhpc_monitoring_firewalld_rules_def
278
245
stackhpc_monitoring_firewalld_rules_default: |
279
246
{% set stackhpc_monitoring_firewalld_rules_formatted = [] %}
280
247
{% for ruleset in stackhpc_monitoring_firewalld_rules_template %}
281
- {% if ruleset.enabled %}
248
+ {% if ruleset.enabled | bool %}
282
249
{% for rule in ruleset.rules %}
283
- {% if rule.network in network_interfaces and rule.network | net_zone is not none %}
250
+ {% if rule.network in network_interfaces and rule.network | net_zone %}
284
251
{% set _ = stackhpc_monitoring_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
285
252
{% endif %}
286
253
{% endfor %}
@@ -300,9 +267,9 @@ stackhpc_wazuh_manager_infra_vm_firewalld_rules: "{{ stackhpc_wazuh_manager_infr
300
267
stackhpc_wazuh_manager_infra_vm_firewalld_rules_default: |
301
268
{% set stackhpc_wazuh_manager_infra_vm_firewalld_rules_formatted = [] %}
302
269
{% for ruleset in stackhpc_wazuh_manager_infra_vm_firewalld_rules_template %}
303
- {% if ruleset.enabled %}
270
+ {% if ruleset.enabled | bool %}
304
271
{% for rule in ruleset.rules %}
305
- {% if rule.network in network_interfaces and rule.network | net_zone is not none %}
272
+ {% if rule.network in network_interfaces and rule.network | net_zone %}
306
273
{% set _ = stackhpc_wazuh_manager_infra_vm_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
307
274
{% endif %}
308
275
{% endfor %}
@@ -345,9 +312,9 @@ stackhpc_ansible_control_infra_vm_firewalld_rules: "{{ stackhpc_ansible_control_
345
312
stackhpc_ansible_control_infra_vm_firewalld_rules_default: |
346
313
{% set stackhpc_ansible_control_infra_vm_firewalld_rules_formatted = [] %}
347
314
{% for ruleset in stackhpc_ansible_control_infra_vm_firewalld_rules_template %}
348
- {% if ruleset.enabled %}
315
+ {% if ruleset.enabled | bool %}
349
316
{% for rule in ruleset.rules %}
350
- {% if rule.network in network_interfaces and rule.network | net_zone is not none %}
317
+ {% if rule.network in network_interfaces and rule.network | net_zone %}
351
318
{% set _ = stackhpc_ansible_control_infra_vm_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
352
319
{% endif %}
353
320
{% endfor %}
@@ -367,9 +334,9 @@ stackhpc_seed_firewalld_rules: "{{ stackhpc_seed_firewalld_rules_default + stack
367
334
stackhpc_seed_firewalld_rules_default: |
368
335
{% set stackhpc_seed_firewalld_rules_formatted = [] %}
369
336
{% for ruleset in stackhpc_seed_firewalld_rules_template %}
370
- {% if ruleset.enabled %}
337
+ {% if ruleset.enabled | bool %}
371
338
{% for rule in ruleset.rules %}
372
- {% if rule.network in network_interfaces and rule.network | net_zone is not none %}
339
+ {% if rule.network in network_interfaces and rule.network | net_zone %}
373
340
{% set _ = stackhpc_seed_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
374
341
{% endif %}
375
342
{% endfor %}
@@ -380,7 +347,7 @@ stackhpc_seed_firewalld_rules_default: |
380
347
stackhpc_seed_firewalld_rules_template:
381
348
# Pulp server
382
349
- rules:
383
- - service : "{{ pulp_port }}/tcp"
350
+ - port : "{{ pulp_port }}/tcp"
384
351
network: "{{ provision_oc_net_name }}"
385
352
state: enabled
386
353
enabled: "{{ seed_pulp_container_enabled | bool }}"
@@ -420,6 +387,7 @@ stackhpc_seed_firewalld_rules_template:
420
387
network: "{{ provision_oc_net_name }}"
421
388
state: enabled
422
389
enabled: "{{ stackhpc_enable_redfish_exporter | default(false) }}"
390
+ # TODO: Rules if SNAT enabled on seed
423
391
424
392
stackhpc_seed_firewalld_rules_extra: []
425
393
@@ -431,9 +399,9 @@ stackhpc_seed_hypervisor_firewalld_rules: "{{ stackhpc_seed_hypervisor_firewalld
431
399
stackhpc_seed_hypervisor_firewalld_rules_default: |
432
400
{% set stackhpc_seed_hypervisor_firewalld_rules_formatted = [] %}
433
401
{% for ruleset in stackhpc_seed_hypervisor_firewalld_rules_template %}
434
- {% if ruleset.enabled %}
402
+ {% if ruleset.enabled | bool %}
435
403
{% for rule in ruleset.rules %}
436
- {% if rule.network in network_interfaces and rule.network | net_zone is not none %}
404
+ {% if rule.network in network_interfaces and rule.network | net_zone %}
437
405
{% set _ = stackhpc_seed_hypervisor_firewalld_rules_formatted.append(rule | combine({'zone': rule.network | net_zone })) %}
438
406
{% endif %}
439
407
{% endfor %}
0 commit comments