iptables.yml 2.1 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182
  1. ---
  2. - name: Check if firewalld is installed
  3. command: rpm -q firewalld
  4. args:
  5. # Disables the following warning:
  6. # Consider using yum, dnf or zypper module rather than running rpm
  7. warn: no
  8. register: pkg_check
  9. failed_when: pkg_check.rc > 1
  10. changed_when: no
  11. - name: Ensure firewalld service is not enabled
  12. service:
  13. name: firewalld
  14. state: stopped
  15. enabled: no
  16. when: pkg_check.rc == 0
  17. # TODO: submit PR upstream to add mask/unmask to service module
  18. - name: Mask firewalld service
  19. command: systemctl mask firewalld
  20. register: result
  21. changed_when: "'firewalld' in result.stdout"
  22. when: pkg_check.rc == 0
  23. ignore_errors: yes
  24. - name: Install iptables packages
  25. action: "{{ ansible_pkg_mgr }} name={{ item }} state=present"
  26. with_items:
  27. - iptables
  28. - iptables-services
  29. register: install_result
  30. when: not openshift.common.is_atomic | bool
  31. - name: Reload systemd units
  32. command: systemctl daemon-reload
  33. when: install_result | changed
  34. - name: Determine if iptables service masked
  35. command: >
  36. systemctl is-enabled {{ item }}
  37. with_items:
  38. - iptables
  39. - ip6tables
  40. register: os_firewall_iptables_masked_output
  41. changed_when: false
  42. failed_when: false
  43. - name: Unmask iptables service
  44. command: >
  45. systemctl unmask {{ item }}
  46. with_items:
  47. - iptables
  48. - ip6tables
  49. when: "'masked' in os_firewall_iptables_masked_output.results | map(attribute='stdout')"
  50. - name: Start and enable iptables service
  51. service:
  52. name: iptables
  53. state: started
  54. enabled: yes
  55. register: result
  56. - name: need to pause here, otherwise the iptables service starting can sometimes cause ssh to fail
  57. pause: seconds=10
  58. when: result | changed
  59. - name: Add iptables allow rules
  60. os_firewall_manage_iptables:
  61. name: "{{ item.service }}"
  62. action: add
  63. protocol: "{{ item.port.split('/')[1] }}"
  64. port: "{{ item.port.split('/')[0] }}"
  65. with_items: "{{ os_firewall_allow }}"
  66. - name: Remove iptables rules
  67. os_firewall_manage_iptables:
  68. name: "{{ item.service }}"
  69. action: remove
  70. protocol: "{{ item.port.split('/')[1] }}"
  71. port: "{{ item.port.split('/')[0] }}"
  72. with_items: "{{ os_firewall_deny }}"