141
141
controller_firewalld_enabled : true
142
142
143
143
# A list of zones to create. Each item is a dict containing a 'zone' item.
144
- controller_firewalld_zones : " {{ controller_firewalld_zones_default | union(controller_firewalld_zones_extra) | unique | select }}"
144
+ controller_firewalld_zones : " {{ controller_firewalld_zones_default | union(controller_firewalld_zones_extra) | unique }}"
145
+
146
+ controller_firewalld_zones_default : |
147
+ {% set network_zones = [] %}
148
+ {% for network in network_interfaces %}
149
+ {% if network | net_zone is not none %}
150
+ {% set _ = network_zones.append({'zone': network | net_zone }) %}
151
+ {% endif %}
152
+ {% endfor %}
153
+ {{ network_zones }}
154
+
145
155
controller_firewalld_zones_extra : []
146
- controller_firewalld_zones_default : " {% set network_zones = [] %}{% for network in network_interfaces %}{% set _ = network_zones.append({'zone': network | net_zone}) %}{% endfor %}{{ network_zones }}"
147
156
148
157
# A firewalld zone to set as the default. Default is unset, in which case the
149
158
# default zone will not be changed.
@@ -157,7 +166,7 @@ controller_firewalld_default_zone: trusted
157
166
# - permanent: true
158
167
# - state: enabled
159
168
controller_firewalld_rules : " {{ controller_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(controller_firewalld_rules_extra) | unique | select }}"
160
- controller_firewalld_rules_extra : []
169
+
161
170
controller_firewalld_rules_default :
162
171
# Common
163
172
- rules :
@@ -177,10 +186,6 @@ controller_firewalld_rules_default:
177
186
zone : " {{ provision_wl_net_name | net_zone }}"
178
187
network : " {{ provision_wl_net_name }}"
179
188
state : enabled
180
- - port : 8089/tcp
181
- zone : " {{ provision_wl_net_name | net_zone }}"
182
- network : " {{ provision_wl_net_name }}"
183
- state : enabled
184
189
- service : cockpit
185
190
zone : " {{ public_net_name | net_zone }}"
186
191
network : " {{ public_net_name }}"
@@ -219,21 +224,30 @@ controller_firewalld_rules_default:
219
224
zone : " {{ tunnel_net_name | net_zone }}"
220
225
network : " {{ tunnel_net_name }}"
221
226
state : enabled
222
- enabled : " {{ ( 'geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types)) | bool }}"
227
+ enabled : " {{ 'geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
223
228
# VXLAN
224
229
- rules :
225
230
- port : 4789/udp
226
231
zone : " {{ tunnel_net_name | net_zone }}"
227
232
network : " {{ tunnel_net_name }}"
228
233
state : enabled
229
- enabled : " {{ ( 'vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types)) | bool }}"
234
+ enabled : " {{ 'vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
230
235
# Octavia
231
236
- rules :
232
237
- port : 5555/udp
233
238
zone : " {{ octavia_net_name | net_zone }}"
234
239
network : " {{ octavia_net_name }}"
235
240
state : enabled
236
241
enabled : " {{ kolla_enable_octavia | bool }}"
242
+ # Overcloud Ironic
243
+ - rules :
244
+ - port : 8089/tcp
245
+ zone : " {{ provision_wl_net_name | net_zone }}"
246
+ network : " {{ provision_wl_net_name }}"
247
+ state : enabled
248
+ enabled : " {{ kolla_enable_octavia | bool }}"
249
+
250
+ controller_firewalld_rules_extra : []
237
251
238
252
# ##############################################################################
239
253
# Controller node swap configuration.
0 commit comments