Skip to content

Commit cc5e64b

Browse files
committed
Remove old firewall config
1 parent b973da3 commit cc5e64b

File tree

8 files changed

+20
-444
lines changed

8 files changed

+20
-444
lines changed

etc/kayobe/compute.yml

Lines changed: 4 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -126,70 +126,22 @@
126126
# Compute node firewalld configuration.
127127

128128
# Whether to install and enable firewalld.
129-
compute_firewalld_enabled: true
129+
#compute_firewalld_enabled:
130130

131131
# A list of zones to create. Each item is a dict containing a 'zone' item.
132-
compute_firewalld_zones: "{{ compute_firewalld_zones_default | union(compute_firewalld_zones_extra) | unique | select }}"
133-
134-
compute_firewalld_zones_default: |
135-
{% set network_zones = [] %}
136-
{% for network in network_interfaces %}
137-
{% if network | net_zone is not none %}
138-
{% set _ = network_zones.append({'zone': network | net_zone }) %}
139-
{% endif %}
140-
{% endfor %}
141-
{{ network_zones }}
142-
143-
compute_firewalld_zones_extra: []
132+
#compute_firewalld_zones:
144133

145134
# A firewalld zone to set as the default. Default is unset, in which case the
146135
# default zone will not be changed.
147-
# FIXME: Try setting to drop
148-
compute_firewalld_default_zone: trusted
136+
#compute_firewalld_default_zone:
149137

150138
# A list of firewall rules to apply. Each item is a dict containing arguments
151139
# to pass to the firewalld module. Arguments are omitted if not provided, with
152140
# the following exceptions:
153141
# - offline: true
154142
# - permanent: true
155143
# - state: enabled
156-
157-
compute_firewalld_rules: "{{ compute_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(compute_firewalld_rules_extra) | unique | select }}"
158-
159-
compute_firewalld_rules_default:
160-
# Common
161-
- rules:
162-
- service: ssh
163-
state: enabled
164-
zone: "{{ admin_oc_net_name | net_zone }}"
165-
network: "{{ provision_oc_net_name }}"
166-
- service: dhcpv6-client
167-
state: disabled
168-
zone: "{{ public_net_name | net_zone }}"
169-
network: "{{ public_net_name }}"
170-
enabled: true
171-
- rules:
172-
- service: ssh
173-
state: disabled
174-
zone: "{{ public_net_name | net_zone }}"
175-
network: "{{ public_net_name }}"
176-
enabled: "{{ public_net_name | net_zone != admin_oc_net_name | net_zone }}"
177-
# GENEVE
178-
- rules:
179-
- port: 6081/udp
180-
state: enabled
181-
zone: "{{ tunnel_net_name | net_zone }}"
182-
network: "{{ tunnel_net_name }}"
183-
enabled: "{{ 'geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
184-
# VXLAN
185-
- rules:
186-
- port: 4789/udp
187-
state: enabled
188-
zone: "{{ tunnel_net_name | net_zone }}"
189-
network: "{{ tunnel_net_name }}"
190-
enabled: "{{ 'vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
191-
192-
compute_firewalld_rules_extra: []
144+
#compute_firewalld_rules:
193145

194146
###############################################################################
195147
# Compute node host libvirt configuration.

etc/kayobe/controllers.yml

Lines changed: 4 additions & 101 deletions
Original file line numberDiff line numberDiff line change
@@ -134,120 +134,23 @@
134134
###############################################################################
135135
# Controller node firewalld configuration.
136136

137-
# FIXME: Replace concrete names (provision_oc) with abstract net names ({{
138-
# provision_oc_net_name }}).
139-
140137
# Whether to install and enable firewalld.
141-
controller_firewalld_enabled: true
138+
#controller_firewalld_enabled:
142139

143140
# A list of zones to create. Each item is a dict containing a 'zone' item.
144-
controller_firewalld_zones: "{{ controller_firewalld_zones_default | union(controller_firewalld_zones_extra) | unique }}"
145-
146-
controller_firewalld_zones_default: |
147-
{% set network_zones = [] %}
148-
{% for network in network_interfaces %}
149-
{% if network | net_zone is not none %}
150-
{% set _ = network_zones.append({'zone': network | net_zone }) %}
151-
{% endif %}
152-
{% endfor %}
153-
{{ network_zones }}
154-
155-
controller_firewalld_zones_extra: []
141+
#controller_firewalld_zones:
156142

157143
# A firewalld zone to set as the default. Default is unset, in which case the
158144
# default zone will not be changed.
159-
# FIXME: Try setting to drop
160-
controller_firewalld_default_zone: trusted
145+
#controller_firewalld_default_zone:
161146

162147
# A list of firewall rules to apply. Each item is a dict containing arguments
163148
# to pass to the firewalld module. Arguments are omitted if not provided, with
164149
# the following exceptions:
165150
# - offline: true
166151
# - permanent: true
167152
# - state: enabled
168-
controller_firewalld_rules: "{{ controller_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(controller_firewalld_rules_extra) | unique | select }}"
169-
170-
controller_firewalld_rules_default:
171-
# Common
172-
- rules:
173-
- service: ssh
174-
zone: "{{ provision_oc_net_name | net_zone }}"
175-
network: "{{ provision_oc_net_name }}"
176-
state: enabled
177-
- service: dhcp
178-
zone: "{{ provision_wl_net_name | net_zone }}"
179-
network: "{{ provision_wl_net_name }}"
180-
state: enabled
181-
- service: ntp
182-
zone: "{{ provision_wl_net_name | net_zone }}"
183-
network: "{{ provision_wl_net_name }}"
184-
state: enabled
185-
- service: tftp
186-
zone: "{{ provision_wl_net_name | net_zone }}"
187-
network: "{{ provision_wl_net_name }}"
188-
state: enabled
189-
- service: cockpit
190-
zone: "{{ public_net_name | net_zone }}"
191-
network: "{{ public_net_name }}"
192-
state: disabled
193-
- service: dhcpv6-client
194-
zone: "{{ public_net_name | net_zone }}"
195-
network: "{{ public_net_name }}"
196-
state: disabled
197-
- service: ssh
198-
zone: "{{ public_net_name | net_zone }}"
199-
network: "{{ public_net_name }}"
200-
state: disabled
201-
enabled: true
202-
# Designate
203-
- rules:
204-
- port: 53/tcp
205-
zone: "{{ public_net_name | net_zone }}"
206-
network: "{{ public_net_name }}"
207-
state: enabled
208-
- port: 53/udp
209-
zone: "{{ public_net_name | net_zone }}"
210-
network: "{{ public_net_name }}"
211-
state: enabled
212-
- port: 5354/tcp
213-
zone: "{{ public_net_name | net_zone }}"
214-
network: "{{ public_net_name }}"
215-
state: enabled
216-
- port: 5354/udp
217-
zone: "{{ public_net_name | net_zone }}"
218-
network: "{{ public_net_name }}"
219-
state: enabled
220-
enabled: "{{ kolla_enable_designate | bool }}"
221-
# GENEVE
222-
- rules:
223-
- port: 6081/udp
224-
zone: "{{ tunnel_net_name | net_zone }}"
225-
network: "{{ tunnel_net_name }}"
226-
state: enabled
227-
enabled: "{{ 'geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
228-
# VXLAN
229-
- rules:
230-
- port: 4789/udp
231-
zone: "{{ tunnel_net_name | net_zone }}"
232-
network: "{{ tunnel_net_name }}"
233-
state: enabled
234-
enabled: "{{ 'vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
235-
# Octavia
236-
- rules:
237-
- port: 5555/udp
238-
zone: "{{ octavia_net_name | net_zone }}"
239-
network: "{{ octavia_net_name }}"
240-
state: enabled
241-
enabled: "{{ kolla_enable_octavia | bool }}"
242-
# Overcloud Ironic
243-
- rules:
244-
- port: 8089/tcp
245-
zone: "{{ provision_wl_net_name | net_zone }}"
246-
network: "{{ provision_wl_net_name }}"
247-
state: enabled
248-
enabled: "{{ kolla_enable_octavia | bool }}"
249-
250-
controller_firewalld_rules_extra: []
153+
#controller_firewalld_rules:
251154

252155
###############################################################################
253156
# Controller node swap configuration.

etc/kayobe/inventory/group_vars/ansible-control/infra-vm

Lines changed: 0 additions & 46 deletions
This file was deleted.

etc/kayobe/inventory/group_vars/wazuh-manager/infra-vm

Lines changed: 0 additions & 75 deletions
This file was deleted.

etc/kayobe/monitoring.yml

Lines changed: 4 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -99,44 +99,22 @@
9999
# Monitoring node firewalld configuration.
100100

101101
# Whether to install and enable firewalld.
102-
monitoring_firewalld_enabled: true
102+
#monitoring_firewalld_enabled:
103103

104104
# A list of zones to create. Each item is a dict containing a 'zone' item.
105-
monitoring_firewalld_zones: "{{ monitoring_firewalld_zones_default | union(monitoring_firewalld_zones_extra) | unique | select }}"
106-
107-
monitoring_firewalld_zones_default: |
108-
{% set network_zones = [] %}
109-
{% for network in network_interfaces %}
110-
{% if network | net_zone is not none %}
111-
{% set _ = network_zones.append({'zone': network | net_zone }) %}
112-
{% endif %}
113-
{% endfor %}
114-
{{ network_zones }}
115-
116-
monitoring_firewalld_zones_extra: []
105+
#monitoring_firewalld_zones:
117106

118107
# A firewalld zone to set as the default. Default is unset, in which case the
119108
# default zone will not be changed.
120-
# FIXME: Try drop
121-
monitoring_firewalld_default_zone: trusted
109+
#monitoring_firewalld_default_zone:
122110

123111
# A list of firewall rules to apply. Each item is a dict containing arguments
124112
# to pass to the firewalld module. Arguments are omitted if not provided, with
125113
# the following exceptions:
126114
# - offline: true
127115
# - permanent: true
128116
# - state: enabled
129-
monitoring_firewalld_rules: "{{ monitoring_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(monitoring_firewalld_rules_extra) | unique | select }}"
130-
131-
monitoring_firewalld_default:
132-
- rules:
133-
- service: ssh
134-
zone: "{{ admin_oc_net_name | net_zone }}"
135-
network: "{{ admin_oc_net_name }}"
136-
state: enabled
137-
enabled: true
138-
139-
monitoring_firewalld_extra: []
117+
#monitoring_firewalld_rules:
140118

141119
###############################################################################
142120
# Monitoring node swap configuration.

etc/kayobe/seed-hypervisor.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,8 +117,6 @@
117117
###############################################################################
118118
# Seed hypervisor node firewalld configuration.
119119

120-
# FIXME: Add some seed hypervisor rules?
121-
122120
# Whether to install and enable firewalld.
123121
#seed_hypervisor_firewalld_enabled:
124122

0 commit comments

Comments
 (0)