Skip to content

Commit e638a42

Browse files
committed
Post-review changes
1 parent 5d8163c commit e638a42

File tree

7 files changed

+122
-42
lines changed

7 files changed

+122
-42
lines changed

etc/kayobe/compute.yml

Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -130,8 +130,17 @@ compute_firewalld_enabled: true
130130

131131
# A list of zones to create. Each item is a dict containing a 'zone' item.
132132
compute_firewalld_zones: "{{ compute_firewalld_zones_default | union(compute_firewalld_zones_extra) | unique | select }}"
133+
134+
compute_firewalld_zones_default: |
135+
{% set network_zones = [] %}
136+
{% for network in network_interfaces %}
137+
{% if network | net_zone is not none %}
138+
{% set _ = network_zones.append({'zone': network | net_zone }) %}
139+
{% endif %}
140+
{% endfor %}
141+
{{ network_zones }}
142+
133143
compute_firewalld_zones_extra: []
134-
compute_firewalld_zones_default: "{% set network_zones = [] %}{% for network in network_interfaces %}{% set _ = network_zones.append({'zone': network | net_zone}) %}{% endfor %}{{ network_zones }}"
135144

136145
# A firewalld zone to set as the default. Default is unset, in which case the
137146
# default zone will not be changed.
@@ -146,37 +155,41 @@ compute_firewalld_default_zone: trusted
146155
# - state: enabled
147156

148157
compute_firewalld_rules: "{{ compute_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(compute_firewalld_rules_extra) | unique | select }}"
149-
compute_firewalld_rules_extra: []
158+
150159
compute_firewalld_rules_default:
151160
# Common
152161
- rules:
153162
- service: ssh
154163
state: enabled
155-
zone: "{{ provision_oc_net_name | net_zone}}"
164+
zone: "{{ admin_oc_net_name | net_zone }}"
156165
network: "{{ provision_oc_net_name }}"
157166
- service: dhcpv6-client
158167
state: disabled
159-
zone: "{{ public_net_name | net_zone}}"
168+
zone: "{{ public_net_name | net_zone }}"
160169
network: "{{ public_net_name }}"
170+
enabled: true
171+
- rules:
161172
- service: ssh
162173
state: disabled
163-
zone: "{{ public_net_name | net_zone}}"
174+
zone: "{{ public_net_name | net_zone }}"
164175
network: "{{ public_net_name }}"
165-
enabled: true
176+
enabled: "{{ public_net_name | net_zone != admin_oc_net_name | net_zone }}"
166177
# GENEVE
167178
- rules:
168179
- port: 6081/udp
169180
state: enabled
170-
zone: "{{ tunnel_net_name | net_zone}}"
181+
zone: "{{ tunnel_net_name | net_zone }}"
171182
network: "{{ tunnel_net_name }}"
172-
enabled: "{{ ('geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types)) | bool }}"
183+
enabled: "{{ 'geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
173184
# VXLAN
174185
- rules:
175186
- port: 4789/udp
176187
state: enabled
177-
zone: "{{ tunnel_net_name | net_zone}}"
188+
zone: "{{ tunnel_net_name | net_zone }}"
178189
network: "{{ tunnel_net_name }}"
179-
enabled: "{{ ('vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types)) | bool }}"
190+
enabled: "{{ 'vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
191+
192+
compute_firewalld_rules_extra: []
180193

181194
###############################################################################
182195
# Compute node host libvirt configuration.

etc/kayobe/controllers.yml

Lines changed: 23 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -141,9 +141,18 @@
141141
controller_firewalld_enabled: true
142142

143143
# A list of zones to create. Each item is a dict containing a 'zone' item.
144-
controller_firewalld_zones: "{{ controller_firewalld_zones_default | union(controller_firewalld_zones_extra) | unique | select }}"
144+
controller_firewalld_zones: "{{ controller_firewalld_zones_default | union(controller_firewalld_zones_extra) | unique }}"
145+
146+
controller_firewalld_zones_default: |
147+
{% set network_zones = [] %}
148+
{% for network in network_interfaces %}
149+
{% if network | net_zone is not none %}
150+
{% set _ = network_zones.append({'zone': network | net_zone }) %}
151+
{% endif %}
152+
{% endfor %}
153+
{{ network_zones }}
154+
145155
controller_firewalld_zones_extra: []
146-
controller_firewalld_zones_default: "{% set network_zones = [] %}{% for network in network_interfaces %}{% set _ = network_zones.append({'zone': network | net_zone}) %}{% endfor %}{{ network_zones }}"
147156

148157
# A firewalld zone to set as the default. Default is unset, in which case the
149158
# default zone will not be changed.
@@ -157,7 +166,7 @@ controller_firewalld_default_zone: trusted
157166
# - permanent: true
158167
# - state: enabled
159168
controller_firewalld_rules: "{{ controller_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(controller_firewalld_rules_extra) | unique | select }}"
160-
controller_firewalld_rules_extra: []
169+
161170
controller_firewalld_rules_default:
162171
# Common
163172
- rules:
@@ -177,10 +186,6 @@ controller_firewalld_rules_default:
177186
zone: "{{ provision_wl_net_name | net_zone }}"
178187
network: "{{ provision_wl_net_name }}"
179188
state: enabled
180-
- port: 8089/tcp
181-
zone: "{{ provision_wl_net_name | net_zone }}"
182-
network: "{{ provision_wl_net_name }}"
183-
state: enabled
184189
- service: cockpit
185190
zone: "{{ public_net_name | net_zone }}"
186191
network: "{{ public_net_name }}"
@@ -219,21 +224,30 @@ controller_firewalld_rules_default:
219224
zone: "{{ tunnel_net_name | net_zone }}"
220225
network: "{{ tunnel_net_name }}"
221226
state: enabled
222-
enabled: "{{ ('geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types)) | bool }}"
227+
enabled: "{{ 'geneve' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
223228
# VXLAN
224229
- rules:
225230
- port: 4789/udp
226231
zone: "{{ tunnel_net_name | net_zone }}"
227232
network: "{{ tunnel_net_name }}"
228233
state: enabled
229-
enabled: "{{ ('vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types)) | bool }}"
234+
enabled: "{{ 'vxlan' in (kolla_neutron_ml2_type_drivers + kolla_neutron_ml2_tenant_network_types) and 'network' in group_names }}"
230235
# Octavia
231236
- rules:
232237
- port: 5555/udp
233238
zone: "{{ octavia_net_name | net_zone }}"
234239
network: "{{ octavia_net_name }}"
235240
state: enabled
236241
enabled: "{{ kolla_enable_octavia | bool }}"
242+
# Overcloud Ironic
243+
- rules:
244+
- port: 8089/tcp
245+
zone: "{{ provision_wl_net_name | net_zone }}"
246+
network: "{{ provision_wl_net_name }}"
247+
state: enabled
248+
enabled: "{{ kolla_enable_octavia | bool }}"
249+
250+
controller_firewalld_rules_extra: []
237251

238252
###############################################################################
239253
# Controller node swap configuration.

etc/kayobe/inventory/group_vars/ansible-control/infra-vm

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,17 @@ infra_vm_firewalld_enabled: true
77

88
# A list of zones to create. Each item is a dict containing a 'zone' item.
99
infra_vm_firewalld_zones: "{{ infra_vm_firewalld_zones_default | union(infra_vm_firewalld_zones_extra) | unique | select }}"
10+
11+
infra_vm_firewalld_zones_default: |
12+
{% set network_zones = [] %}
13+
{% for network in network_interfaces %}
14+
{% if network | net_zone is not none %}
15+
{% set _ = network_zones.append({'zone': network | net_zone }) %}
16+
{% endif %}
17+
{% endfor %}
18+
{{ network_zones }}
19+
1020
infra_vm_firewalld_zones_extra: []
11-
infra_vm_firewalld_zones_default: "{% set network_zones = [] %}{% for network in network_interfaces %}{% set _ = network_zones.append({'zone': network | net_zone}) %}{% endfor %}{{ network_zones }}"
1221

1322
# A firewalld zone to set as the default. Default is unset, in which case the
1423
# default zone will not be changed.
@@ -21,15 +30,17 @@ infra_vm_firewalld_default_zone: drop
2130
# - permanent: true
2231
# - state: enabled
2332
infra_vm_firewalld_rules: "{{ infra_vm_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(infra_vm_firewalld_rules_extra) | unique | select }}"
24-
infra_vm_firewalld_rules_extra: []
33+
2534
infra_vm_firewalld_rules_default:
2635
- rules:
2736
- service: ssh
28-
zone: "{{ provision_oc_net_name | net_zone}}"
37+
zone: "{{ provision_oc_net_name | net_zone }}"
2938
network: "{{ provision_oc_net_name }}"
3039
state: enabled
3140
- service: ssh
32-
zone: "{{ switch_mgmt_net_name | net_zone}}"
41+
zone: "{{ switch_mgmt_net_name | net_zone }}"
3342
network: "{{ switch_mgmt_net_name }}"
3443
state: enabled
3544
enabled: true
45+
46+
infra_vm_firewalld_rules_extra: []

etc/kayobe/inventory/group_vars/wazuh-manager/infra-vm

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,22 @@
22
###############################################################################
33
# Infrastructure VM node firewalld configuration.
44

5-
# FIXME: Replace concrete names (provision_oc) with abstract net names ({{
6-
# provision_oc_net_name }}).
7-
85
# Whether to install and enable firewalld.
96
infra_vm_firewalld_enabled: true
107

118
# A list of zones to create. Each item is a dict containing a 'zone' item.
129
infra_vm_firewalld_zones: "{{ infra_vm_firewalld_zones_default | union(infra_vm_firewalld_zones_extra) | unique | select }}"
10+
11+
infra_vm_firewalld_zones_default: |
12+
{% set network_zones = [] %}
13+
{% for network in network_interfaces %}
14+
{% if network | net_zone is not none %}
15+
{% set _ = network_zones.append({'zone': network | net_zone }) %}
16+
{% endif %}
17+
{% endfor %}
18+
{{ network_zones }}
19+
1320
infra_vm_firewalld_zones_extra: []
14-
infra_vm_firewalld_zones_default: "{% set network_zones = [] %}{% for network in network_interfaces %}{% set _ = network_zones.append({'zone': network | net_zone}) %}{% endfor %}{{ network_zones }}"
1521

1622
# A firewalld zone to set as the default. Default is unset, in which case the
1723
# default zone will not be changed.
@@ -24,15 +30,15 @@ infra_vm_firewalld_default_zone: drop
2430
# - permanent: true
2531
# - state: enabled
2632
infra_vm_firewalld_rules: "{{ infra_vm_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(infra_vm_firewalld_rules_extra) | unique | select }}"
27-
infra_vm_firewalld_rules_extra: []
33+
2834
infra_vm_firewalld_rules_default:
2935
- rules:
3036
- service: ssh
31-
zone: "{{ provision_oc_net_name | net_zone}}"
37+
zone: "{{ provision_oc_net_name | net_zone }}"
3238
network: "{{ provision_oc_net_name }}"
3339
state: enabled
3440
- service: ssh
35-
zone: "{{ switch_mgmt_net_name | net_zone}}"
41+
zone: "{{ switch_mgmt_net_name | net_zone }}"
3642
network: "{{ switch_mgmt_net_name }}"
3743
state: enabled
3844
- port: 1514/tcp
@@ -64,3 +70,6 @@ infra_vm_firewalld_rules_default:
6470
network: "{{ provision_oc_net_name }}"
6571
state: enabled
6672
enabled: true
73+
74+
infra_vm_firewalld_rules_extra: []
75+

etc/kayobe/monitoring.yml

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,8 +103,17 @@ monitoring_firewalld_enabled: true
103103

104104
# A list of zones to create. Each item is a dict containing a 'zone' item.
105105
monitoring_firewalld_zones: "{{ monitoring_firewalld_zones_default | union(monitoring_firewalld_zones_extra) | unique | select }}"
106+
107+
monitoring_firewalld_zones_default: |
108+
{% set network_zones = [] %}
109+
{% for network in network_interfaces %}
110+
{% if network | net_zone is not none %}
111+
{% set _ = network_zones.append({'zone': network | net_zone }) %}
112+
{% endif %}
113+
{% endfor %}
114+
{{ network_zones }}
115+
106116
monitoring_firewalld_zones_extra: []
107-
monitoring_firewalld_zones_default: "{% set network_zones = [] %}{% for network in network_interfaces %}{% set _ = network_zones.append({'zone': network | net_zone}) %}{% endfor %}{{ network_zones }}"
108117

109118
# A firewalld zone to set as the default. Default is unset, in which case the
110119
# default zone will not be changed.
@@ -118,7 +127,7 @@ monitoring_firewalld_default_zone: trusted
118127
# - permanent: true
119128
# - state: enabled
120129
monitoring_firewalld_rules: "{{ monitoring_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(monitoring_firewalld_rules_extra) | unique | select }}"
121-
monitoring_firewalld_extra: []
130+
122131
monitoring_firewalld_default:
123132
- rules:
124133
- service: ssh
@@ -127,6 +136,8 @@ monitoring_firewalld_default:
127136
state: enabled
128137
enabled: true
129138

139+
monitoring_firewalld_extra: []
140+
130141
###############################################################################
131142
# Monitoring node swap configuration.
132143

etc/kayobe/seed.yml

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -167,8 +167,17 @@ seed_firewalld_enabled: true
167167

168168
# A list of zones to create. Each item is a dict containing a 'zone' item.
169169
seed_firewalld_zones: "{{ seed_firewalld_zones_default | union(seed_firewalld_zones_extra) | unique | select }}"
170+
171+
seed_firewalld_zones_default: |
172+
{% set network_zones = [] %}
173+
{% for network in network_interfaces %}
174+
{% if network | net_zone is not none %}
175+
{% set _ = network_zones.append({'zone': network | net_zone }) %}
176+
{% endif %}
177+
{% endfor %}
178+
{{ network_zones }}
179+
170180
seed_firewalld_zones_extra: []
171-
seed_firewalld_zones_default: "{% set network_zones = [] %}{% for network in network_interfaces %}{% set _ = network_zones.append({'zone': network | net_zone}) %}{% endfor %}{{ network_zones }}"
172181

173182
# A firewalld zone to set as the default. Default is unset, in which case the
174183
# default zone will not be changed.
@@ -181,7 +190,7 @@ seed_firewalld_default_zone: drop
181190
# - permanent: true
182191
# - state: enabled
183192
seed_firewalld_rules: "{{ seed_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(seed_firewalld_rules_extra) | unique | select }}"
184-
seed_firewalld_rules_extra: []
193+
185194
seed_firewalld_rules_default:
186195
# Common
187196
- rules:
@@ -201,20 +210,18 @@ seed_firewalld_rules_default:
201210
zone: "{{ provision_oc_net_name | net_zone }}"
202211
network: "{{ provision_oc_net_name }}"
203212
state: enabled
204-
- service: ntp
205-
zone: "{{ switch_mgmt_net_name | net_zone }}"
206-
network: "{{ switch_mgmt_net_name }}"
207-
state: enabled
208213
# Disable default services in public zone
209214
- service: dhcpv6-client
210215
state: disabled
211216
zone: "{{ public_net_name | net_zone }}"
212217
network: "{{ public_net_name }}"
218+
enabled: true
219+
- rules:
213220
- service: ssh
214221
state: disabled
215222
zone: "{{ public_net_name | net_zone }}"
216223
network: "{{ public_net_name }}"
217-
enabled: true
224+
enabled: "{{ public_net_name | net_zone != provision_oc_net_name | net_zone}}"
218225
# Pulp server
219226
- rules:
220227
- service: http
@@ -255,6 +262,8 @@ seed_firewalld_rules_default:
255262
state: enabled
256263
enabled: true
257264

265+
seed_firewalld_rules_extra: []
266+
258267
###############################################################################
259268
# Seed node swap configuration.
260269

etc/kayobe/storage.yml

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,8 +138,17 @@ storage_firewalld_enabled: true
138138

139139
# A list of zones to create. Each item is a dict containing a 'zone' item.
140140
storage_firewalld_zones: "{{ storage_firewalld_zones_default | union(storage_firewalld_zones_extra) | unique | select }}"
141+
142+
storage_firewalld_zones_default: |
143+
{% set network_zones = [] %}
144+
{% for network in network_interfaces %}
145+
{% if network | net_zone is not none %}
146+
{% set _ = network_zones.append({'zone': network | net_zone }) %}
147+
{% endif %}
148+
{% endfor %}
149+
{{ network_zones }}
150+
141151
storage_firewalld_zones_extra: []
142-
storage_firewalld_zones_default: "{% set network_zones = [] %}{% for network in network_interfaces %}{% set _ = network_zones.append({'zone': network | net_zone}) %}{% endfor %}{{ network_zones }}"
143152

144153
# A firewalld zone to set as the default. Default is unset, in which case the
145154
# default zone will not be changed.
@@ -153,7 +162,7 @@ storage_firewalld_default_zone: trusted
153162
# - permanent: true
154163
# - state: enabled
155164
storage_firewalld_rules: "{{ storage_firewalld_rules_default | selectattr('enabled', 'true') | map(attribute='rules') | flatten | selectattr('network', 'in', network_interfaces) | selectattr('zone') | union(storage_firewalld_rules_extra) | unique | select }}"
156-
storage_firewalld_extra: []
165+
157166
storage_firewalld_default:
158167
# Common
159168
- rules:
@@ -165,10 +174,12 @@ storage_firewalld_default:
165174
zone: "{{ provision_oc_net_name | net_zone }}"
166175
network: "{{ provision_oc_net_name }}"
167176
state: enabled
177+
enabled: true
178+
- rules:
168179
- service: ssh
169180
zone: "{{ storage_net_name | net_zone }}"
170181
network: "{{ storage_net_name }}"
171-
state: disabled
182+
state: "{{ storage_net_name | net_zone != provision_oc_net_name | net_zone}}"
172183
enabled: true
173184
# Ceph
174185
- rules:
@@ -182,6 +193,8 @@ storage_firewalld_default:
182193
state: "{{ 'enabled' if 'mons' in group_names else 'disabled' }}"
183194
enabled: "{{ stackhpc_enable_ceph | default(false) | bool }}"
184195

196+
storage_firewalld_extra: []
197+
185198
###############################################################################
186199
# Storage node swap configuration.
187200

0 commit comments

Comments
 (0)