darexsu.firewalld
Ansible-Rolle firewalld
- Rolle:
- Playbooks (Merge-Version):
- Playbooks (Vollversion):
Plattformen
Testen | Bereit zur Nutzung |
---|---|
Debian 11 | :heavy_check_mark: |
Debian 10 | :heavy_check_mark: |
Ubuntu 20.04 | :heavy_check_mark: |
Ubuntu 18.04 | :heavy_check_mark: |
Oracle Linux 8 | :heavy_check_mark: |
Rocky Linux 8 | :heavy_check_mark: |
Installieren
ansible-galaxy install darexsu.firewalld --force
Verhalten
Ersatz oder Zusammenführung von Wörterbüchern (mit "hash_behaviour=replace" in ansible.cfg):
# Ersetzen # Zusammenführen
--- ---
vars: vars:
dict: merge:
a: "Wert" dict:
b: "Wert" a: "Wert"
b: "Wert"
# Wie funktioniert die Zusammenführung?
Ihre vars [host_vars] --> Standard vars [aktuelle Rolle] --> Standard vars [einbezogene Rolle]
dict: dict: dict:
a: "1" --> a: "1" --> a: "1"
b: "2" --> b: "2"
c: "3"
Installieren und konfigurieren: firewalld (Merge-Version)
---
- hosts: alle
become: true
vars:
merge:
# FirewallD
firewalld:
enabled: true
# FirewallD -> installieren
firewalld_install:
enabled: true
# FirewallD -> Regeln
firewalld_rules:
port_80:
enabled: true
zone: "public"
state: "enabled"
port: "80/tcp"
permanent: true
service_http:
enabled: true
zone: "public"
state: "enabled"
service: "http"
permanent: true
service_https:
enabled: true
zone: "public"
state: "enabled"
service: "https"
permanent: true
# ...
tasks:
- name: Rolle darexsu firewalld
include_role:
name: darexsu.firewalld
Installieren: firewalld (Merge-Version)
---
- hosts: alle
become: true
vars:
merge:
# FirewallD
firewalld:
enabled: true
# FirewallD -> installieren
firewalld_install:
enabled: true
tasks:
- name: Rolle darexsu firewalld
include_role:
name: darexsu.firewalld
Konfigurieren: Firewall-Regeln hinzufügen (Merge-Version)
---
- hosts: alle
become: true
vars:
merge:
# FirewallD
firewalld:
enabled: true
# FirewallD -> Regeln
firewalld_rules:
port_80:
enabled: true
zone: "public"
state: "enabled"
port: "80/tcp"
permanent: true
service_http:
enabled: true
zone: "public"
state: "enabled"
service: "http"
permanent: true
service_https:
enabled: true
zone: "public"
state: "enabled"
service: "https"
permanent: true
# rule_name:
# enabled: true
# key: value
# ...
tasks:
- name: Rolle darexsu firewalld
include_role:
name: darexsu.firewalld
Installieren und konfigurieren: firewalld (Vollversion)
---
- hosts: alle
become: true
vars:
# FirewallD
firewalld:
enabled: true
service:
enabled: true
state: "started"
# FirewallD -> installieren
firewalld_install:
enabled: true
# FirewallD -> Regeln
firewalld_rules:
port_80:
enabled: true
zone: "public"
state: "enabled"
port: "80/tcp"
permanent: true
immediate: true
service_http:
enabled: true
zone: "public"
state: "enabled"
service: "http"
permanent: true
immediate: true
service_https:
enabled: true
zone: "public"
state: "enabled"
service: "https"
permanent: true
immediate: true
# ...
tasks:
- name: Rolle darexsu firewalld
include_role:
name: darexsu.firewalld
Installieren: firewalld (Vollversion)
---
- hosts: alle
become: true
vars:
# FirewallD
firewalld:
enabled: true
# FirewallD -> installieren
firewalld_install:
enabled: true
tasks:
- name: Rolle darexsu firewalld
include_role:
name: darexsu.firewalld
Konfigurieren: Firewall-Regeln hinzufügen (Vollversion)
---
- hosts: alle
become: true
vars:
# FirewallD
firewalld:
enabled: true
service:
enabled: true
state: "started"
# FirewallD -> Regeln
firewalld_rules:
port_80:
enabled: true
zone: "public"
state: "enabled"
port: "80/tcp"
permanent: true
immediate: true
service_http:
enabled: true
zone: "public"
state: "enabled"
service: "http"
permanent: true
immediate: true
service_https:
enabled: true
zone: "public"
state: "enabled"
service: "https"
permanent: true
immediate: true
# rule_name:
# enabled: true
# key: value
# ...
tasks:
- name: Rolle darexsu firewalld
include_role:
name: darexsu.firewalld