post-install.yml 2.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
  1. ---
  2. - hosts: OSEv3
  3. gather_facts: False
  4. become: True
  5. tasks:
  6. - name: Save iptables rules to a backup file
  7. when: openshift_use_flannel|default(False)|bool
  8. shell: iptables-save > /etc/sysconfig/iptables.orig-$(date +%Y%m%d%H%M%S)
  9. # Enable iptables service on app nodes to persist custom rules (flannel SDN)
  10. # FIXME(bogdando) w/a https://bugzilla.redhat.com/show_bug.cgi?id=1490820
  11. - hosts: app
  12. gather_facts: False
  13. become: True
  14. vars:
  15. os_firewall_allow:
  16. - service: dnsmasq tcp
  17. port: 53/tcp
  18. - service: dnsmasq udp
  19. port: 53/udp
  20. tasks:
  21. - when: openshift_use_flannel|default(False)|bool
  22. block:
  23. - include_role:
  24. name: openshift-ansible/roles/os_firewall
  25. - include_role:
  26. name: openshift-ansible/roles/lib_os_firewall
  27. - name: set allow rules for dnsmasq
  28. os_firewall_manage_iptables:
  29. name: "{{ item.service }}"
  30. action: add
  31. protocol: "{{ item.port.split('/')[1] }}"
  32. port: "{{ item.port.split('/')[0] }}"
  33. with_items: "{{ os_firewall_allow }}"
  34. - hosts: OSEv3
  35. gather_facts: False
  36. become: True
  37. tasks:
  38. - name: Apply post-install iptables hacks for Flannel SDN (the best effort)
  39. when: openshift_use_flannel|default(False)|bool
  40. block:
  41. - name: set allow/masquerade rules for for flannel/docker
  42. shell: >-
  43. (iptables-save | grep -q custom-flannel-docker-1) ||
  44. iptables -A DOCKER -w
  45. -p all -j ACCEPT
  46. -m comment --comment "custom-flannel-docker-1";
  47. (iptables-save | grep -q custom-flannel-docker-2) ||
  48. iptables -t nat -A POSTROUTING -w
  49. -o {{flannel_interface|default('eth1')}}
  50. -m comment --comment "custom-flannel-docker-2"
  51. -j MASQUERADE
  52. # NOTE(bogdando) the rules will not be restored, when iptables service unit is disabled & masked
  53. - name: Persist in-memory iptables rules (w/o dynamic KUBE rules)
  54. shell: iptables-save | grep -v KUBE > /etc/sysconfig/iptables