Stop the iptables service when disabled.
This commit is contained in:
parent
3dad37d0ea
commit
9521affbdb
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
- name: Start the iptables service
|
- name: Start the iptables service
|
||||||
service: name=iptables-persistent state=restarted enabled=yes
|
service: name=iptables-persistent state=restarted enabled=yes
|
||||||
notify: Restart fail2ban
|
notify: Restart fail2ban after an iptables restart
|
||||||
|
|
||||||
- name: Start the netfilter service
|
- name: Start the netfilter service
|
||||||
service: name=netfilter-persistent state=restarted enabled=yes
|
service: name=netfilter-persistent state=restarted enabled=yes
|
||||||
|
@ -30,4 +30,3 @@
|
||||||
when:
|
when:
|
||||||
- fail2ban_enabled is defined and fail2ban_enabled
|
- fail2ban_enabled is defined and fail2ban_enabled
|
||||||
- centos_install_epel
|
- centos_install_epel
|
||||||
|
|
||||||
|
|
|
@ -1,25 +1,23 @@
|
||||||
galaxy_info:
|
galaxy_info:
|
||||||
author: Andrea Dell'Amico
|
author: Andrea Dell'Amico
|
||||||
description: Systems Architect
|
description: Linux firewall rules (netfilter-persistent or firewalld)
|
||||||
company: ISTI-CNR
|
company: ISTI-CNR
|
||||||
|
namespace: adellam
|
||||||
issue_tracker_url: https://redmine-s2i2s.isti.cnr.it/projects/provisioning
|
role_name: linux_firewall
|
||||||
|
|
||||||
license: EUPL 1.2+
|
license: EUPL 1.2+
|
||||||
|
min_ansible_version: "2.9"
|
||||||
min_ansible_version: 2.8
|
|
||||||
|
|
||||||
# To view available platforms and versions (or releases), visit:
|
|
||||||
# https://galaxy.ansible.com/api/v1/platforms/
|
|
||||||
#
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: Ubuntu
|
- name: Ubuntu
|
||||||
versions:
|
versions:
|
||||||
- trusty
|
- trusty
|
||||||
- bionic
|
- bionic
|
||||||
|
- focal
|
||||||
|
- jammy
|
||||||
- name: EL
|
- name: EL
|
||||||
versions:
|
versions:
|
||||||
- 7
|
- "7"
|
||||||
|
- "8"
|
||||||
|
- "9"
|
||||||
|
|
||||||
galaxy_tags:
|
galaxy_tags:
|
||||||
- firewall
|
- firewall
|
||||||
|
|
|
@ -0,0 +1,14 @@
|
||||||
|
---
|
||||||
|
- name: disable-plain-iptables | Stop the iptables firewall
|
||||||
|
tags: ['iptables', 'iptables_rules']
|
||||||
|
block:
|
||||||
|
- name: disable-plain-iptables | Flush the iptables rules
|
||||||
|
ansible.builtin.command: /usr/sbin/netfilter-persistent flush
|
||||||
|
ignore_errors: true
|
||||||
|
|
||||||
|
- name: disable-plain-iptables | Stop and disable the netfilter service
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: netfilter-persistent
|
||||||
|
state: stopped
|
||||||
|
enabled: false
|
||||||
|
notify: Restart fail2ban
|
|
@ -0,0 +1,8 @@
|
||||||
|
---
|
||||||
|
- name: iptables-packages | Manage the iptables packages
|
||||||
|
block:
|
||||||
|
- name: iptables-packages | Install the needed iptables packages
|
||||||
|
ansible.builtin.apt:
|
||||||
|
pkg: "{{ iptables_deb_pkgs }}"
|
||||||
|
state: present
|
||||||
|
cache_valid_time: 1800
|
|
@ -1,9 +1,22 @@
|
||||||
---
|
---
|
||||||
- import_tasks: plain-iptables.yml
|
- name: Iptables packages
|
||||||
|
ansible.builtin.import_tasks: iptables-packages.yml
|
||||||
|
when:
|
||||||
|
- ansible_distribution_file_variety == "Debian"
|
||||||
|
- name: Plain iptables
|
||||||
|
ansible.builtin.import_tasks: plain-iptables.yml
|
||||||
when:
|
when:
|
||||||
- iptables_persistent_enabled
|
- iptables_persistent_enabled
|
||||||
- ansible_distribution_file_variety == "Debian"
|
- ansible_distribution_file_variety == "Debian"
|
||||||
- import_tasks: firewalld_rules.yml
|
- name: Disable iptables
|
||||||
|
ansible.builtin.import_tasks: disable-plain-iptables.yml
|
||||||
|
when:
|
||||||
|
- not iptables_persistent_enabled
|
||||||
|
- ansible_distribution_file_variety == "Debian"
|
||||||
|
- ansible_distribution_version is version_compare('16.04', '>=')
|
||||||
|
- name: Firewalld rules
|
||||||
|
ansible.builtin.import_tasks: firewalld_rules.yml
|
||||||
when: ansible_distribution_file_variety == "RedHat"
|
when: ansible_distribution_file_variety == "RedHat"
|
||||||
- import_tasks: firewalld_disable.yml
|
- name: Disable firewalld
|
||||||
|
ansible.builtin.import_tasks: firewalld_disable.yml
|
||||||
when: ansible_distribution_file_variety == "RedHat"
|
when: ansible_distribution_file_variety == "RedHat"
|
||||||
|
|
|
@ -1,8 +1,5 @@
|
||||||
---
|
---
|
||||||
- block:
|
- block:
|
||||||
- name: Install the needed iptables packages
|
|
||||||
apt: pkg={{ iptables_deb_pkgs }} state=present cache_valid_time=1800
|
|
||||||
|
|
||||||
- name: Install the IPv4 and IPv6 iptables rules. The IPv6 ones are not used. On trusty
|
- name: Install the IPv4 and IPv6 iptables rules. The IPv6 ones are not used. On trusty
|
||||||
template: src=iptables-{{ item }}.j2 dest=/etc/iptables/{{ item }} owner=root group=root mode=0640
|
template: src=iptables-{{ item }}.j2 dest=/etc/iptables/{{ item }} owner=root group=root mode=0640
|
||||||
with_items:
|
with_items:
|
||||||
|
|
Loading…
Reference in New Issue