|
134 | 134 | ###############################################################################
|
135 | 135 | # Controller node firewalld configuration.
|
136 | 136 |
|
137 |
| -# FIXME: Replace concrete names (provision_oc) with abstract net names ({{ |
138 |
| -# provision_oc_net_name }}). |
139 |
| - |
140 | 137 | # Whether to install and enable firewalld.
|
141 |
| -controller_firewalld_enabled: true |
| 138 | +#controller_firewalld_enabled: |
142 | 139 |
|
143 | 140 | # A list of zones to create. Each item is a dict containing a 'zone' item.
|
144 |
| -controller_firewalld_zones: "{{ controller_firewalld_zones_default | union(controller_firewalld_zones_extra) | unique }}" |
145 |
| - |
146 |
| -controller_firewalld_zones_default: | |
147 |
| - {% set network_zones = [] %} |
148 |
| - {% for network in network_interfaces %} |
149 |
| - {% if network | net_zone is not none %} |
150 |
| - {% set _ = network_zones.append({'zone': network | net_zone }) %} |
151 |
| - {% endif %} |
152 |
| - {% endfor %} |
153 |
| - {{ network_zones }} |
154 |
| -
|
155 |
| -controller_firewalld_zones_extra: [] |
| 141 | +#controller_firewalld_zones: |
156 | 142 |
|
157 | 143 | # A firewalld zone to set as the default. Default is unset, in which case the
|
158 | 144 | # default zone will not be changed.
|
159 |
| -# FIXME: Try setting to drop |
160 |
| -controller_firewalld_default_zone: trusted |
| 145 | +#controller_firewalld_default_zone: |
161 | 146 |
|
162 | 147 | # A list of firewall rules to apply. Each item is a dict containing arguments
|
163 | 148 | # to pass to the firewalld module. Arguments are omitted if not provided, with
|
164 | 149 | # the following exceptions:
|
165 | 150 | # - offline: true
|
166 | 151 | # - permanent: true
|
167 | 152 | # - state: enabled
|
168 |
| -controller_firewalld_rules: "{{ controller_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(controller_firewalld_rules_extra) | unique | select }}" |
169 |
| - |
170 |
| -controller_firewalld_rules_default: |
171 |
| - # Common |
172 |
| - - rules: |
173 |
| - - service: ssh |
174 |
| - zone: "{{ provision_oc_net_name | net_zone }}" |
175 |
| - network: "{{ provision_oc_net_name }}" |
176 |
| - state: enabled |
177 |
| - - service: dhcp |
178 |
| - zone: "{{ provision_wl_net_name | net_zone }}" |
179 |
| - network: "{{ provision_wl_net_name }}" |
180 |
| - state: enabled |
181 |
| - - service: ntp |
182 |
| - zone: "{{ provision_wl_net_name | net_zone }}" |
183 |
| - network: "{{ provision_wl_net_name }}" |
184 |
| - state: enabled |
185 |
| - - service: tftp |
186 |
| - zone: "{{ provision_wl_net_name | net_zone }}" |
187 |
| - network: "{{ provision_wl_net_name }}" |
188 |
| - state: enabled |
189 |
| - - service: cockpit |
190 |
| - zone: "{{ public_net_name | net_zone }}" |
191 |
| - network: "{{ public_net_name }}" |
192 |
| - state: disabled |
193 |
| - - service: dhcpv6-client |
194 |
| - zone: "{{ public_net_name | net_zone }}" |
195 |
| - network: "{{ public_net_name }}" |
196 |
| - state: disabled |
197 |
| - - service: ssh |
198 |
| - zone: "{{ public_net_name | net_zone }}" |
199 |
| - network: "{{ public_net_name }}" |
200 |
| - state: disabled |
201 |
| - enabled: true |
202 |
| - # Designate |
203 |
| - - rules: |
204 |
| - - port: 53/tcp |
205 |
| - zone: "{{ public_net_name | net_zone }}" |
206 |
| - network: "{{ public_net_name }}" |
207 |
| - state: enabled |
208 |
| - - port: 53/udp |
209 |
| - zone: "{{ public_net_name | net_zone }}" |
210 |
| - network: "{{ public_net_name }}" |
211 |
| - state: enabled |
212 |
| - - port: 5354/tcp |
213 |
| - zone: "{{ public_net_name | net_zone }}" |
214 |
| - network: "{{ public_net_name }}" |
215 |
| - state: enabled |
216 |
| - - port: 5354/udp |
217 |
| - zone: "{{ public_net_name | net_zone }}" |
218 |
| - network: "{{ public_net_name }}" |
219 |
| - state: enabled |
220 |
| - enabled: "{{ kolla_enable_designate | bool }}" |
221 |
| - # GENEVE |
222 |
| - - rules: |
223 |
| - - port: 6081/udp |
224 |
| - zone: "{{ tunnel_net_name | net_zone }}" |
225 |
| - network: "{{ tunnel_net_name }}" |
226 |
| - state: enabled |
227 |
| - enabled: "{{ 'geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}" |
228 |
| - # VXLAN |
229 |
| - - rules: |
230 |
| - - port: 4789/udp |
231 |
| - zone: "{{ tunnel_net_name | net_zone }}" |
232 |
| - network: "{{ tunnel_net_name }}" |
233 |
| - state: enabled |
234 |
| - enabled: "{{ 'vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}" |
235 |
| - # Octavia |
236 |
| - - rules: |
237 |
| - - port: 5555/udp |
238 |
| - zone: "{{ octavia_net_name | net_zone }}" |
239 |
| - network: "{{ octavia_net_name }}" |
240 |
| - state: enabled |
241 |
| - enabled: "{{ kolla_enable_octavia | bool }}" |
242 |
| - # Overcloud Ironic |
243 |
| - - rules: |
244 |
| - - port: 8089/tcp |
245 |
| - zone: "{{ provision_wl_net_name | net_zone }}" |
246 |
| - network: "{{ provision_wl_net_name }}" |
247 |
| - state: enabled |
248 |
| - enabled: "{{ kolla_enable_octavia | bool }}" |
249 |
| - |
250 |
| -controller_firewalld_rules_extra: [] |
| 153 | +#controller_firewalld_rules: |
251 | 154 |
|
252 | 155 | ###############################################################################
|
253 | 156 | # Controller node swap configuration.
|
|
0 commit comments