darexsu.firewalld
Rôle Ansible firewalld
- Rôle :
- Playbooks (version fusion) :
- Playbooks (version complète) :
Plateformes
Test | Prêt à l'emploi |
---|---|
Debian 11 | :heavy_check_mark: |
Debian 10 | :heavy_check_mark: |
Ubuntu 20.04 | :heavy_check_mark: |
Ubuntu 18.04 | :heavy_check_mark: |
Oracle Linux 8 | :heavy_check_mark: |
Rocky Linux 8 | :heavy_check_mark: |
Installation
ansible-galaxy install darexsu.firewalld --force
Comportement
Remplacer ou fusionner des dictionnaires (avec "hash_behaviour=replace" dans ansible.cfg) :
# Remplacer # Fusionner
--- ---
vars: vars:
dict: merge:
a: "valeur" dict:
b: "valeur" a: "valeur"
b: "valeur"
# Comment fonctionne la fusion ?
Vos vars [host_vars] --> vars par défaut [rôle actuel] --> vars par défaut [rôle inclus]
dict: dict: dict:
a: "1" --> a: "1" --> a: "1"
b: "2" --> b: "2"
c: "3"
Installer et configurer : firewalld (version fusion)
---
- hosts: all
become: true
vars:
merge:
# FirewallD
firewalld:
enabled: true
# FirewallD -> installation
firewalld_install:
enabled: true
# FirewallD -> règles
firewalld_rules:
port_80:
enabled: true
zone: "public"
state: "enabled"
port: "80/tcp"
permanent: true
service_http:
enabled: true
zone: "public"
state: "enabled"
service: "http"
permanent: true
service_https:
enabled: true
zone: "public"
state: "enabled"
service: "https"
permanent: true
# ...
tasks:
- name: rôle darexsu firewalld
include_role:
name: darexsu.firewalld
Installer : firewalld (version fusion)
---
- hosts: all
become: true
vars:
merge:
# FirewallD
firewalld:
enabled: true
# FirewallD -> installation
firewalld_install:
enabled: true
tasks:
- name: rôle darexsu firewalld
include_role:
name: darexsu.firewalld
Configurer : ajouter des règles de pare-feu (version fusion)
---
- hosts: all
become: true
vars:
merge:
# FirewallD
firewalld:
enabled: true
# FirewallD -> règles
firewalld_rules:
port_80:
enabled: true
zone: "public"
state: "enabled"
port: "80/tcp"
permanent: true
service_http:
enabled: true
zone: "public"
state: "enabled"
service: "http"
permanent: true
service_https:
enabled: true
zone: "public"
state: "enabled"
service: "https"
permanent: true
# rule_name:
# enabled: true
# key: value
# ...
tasks:
- name: rôle darexsu firewalld
include_role:
name: darexsu.firewalld
Installer et configurer : firewalld (version complète)
---
- hosts: all
become: true
vars:
# FirewallD
firewalld:
enabled: true
service:
enabled: true
state: "started"
# FirewallD -> installation
firewalld_install:
enabled: true
# FirewallD -> règles
firewalld_rules:
port_80:
enabled: true
zone: "public"
state: "enabled"
port: "80/tcp"
permanent: true
immediate: true
service_http:
enabled: true
zone: "public"
state: "enabled"
service: "http"
permanent: true
immediate: true
service_https:
enabled: true
zone: "public"
state: "enabled"
service: "https"
permanent: true
immediate: true
# ...
tasks:
- name: rôle darexsu firewalld
include_role:
name: darexsu.firewalld
Installer : firewalld (version complète)
---
- hosts: all
become: true
vars:
# FirewallD
firewalld:
enabled: true
# FirewallD -> installation
firewalld_install:
enabled: true
tasks:
- name: rôle darexsu firewalld
include_role:
name: darexsu.firewalld
Configurer : ajouter des règles de pare-feu (version complète)
---
- hosts: all
become: true
vars:
# FirewallD
firewalld:
enabled: true
service:
enabled: true
state: "started"
# FirewallD -> règles
firewalld_rules:
port_80:
enabled: true
zone: "public"
state: "enabled"
port: "80/tcp"
permanent: true
immediate: true
service_http:
enabled: true
zone: "public"
state: "enabled"
service: "http"
permanent: true
immediate: true
service_https:
enabled: true
zone: "public"
state: "enabled"
service: "https"
permanent: true
immediate: true
# rule_name:
# enabled: true
# key: value
# ...
tasks:
- name: rôle darexsu firewalld
include_role:
name: darexsu.firewalld