remove ssh from tripleo::firewall::pre
including global ssh access in tripleo::firewall::pre makes it difficult for the operator to control ssh access to overcloud hosts. This removes the hardcoded rule and the accompanying change in t-h-t configures the default firewall rules via hiera config_settings. Depends-On: I89cff59947dda3f51482486c41a3d67c4aa36a3e Change-Id: I14b540e6564c5b7c5d54b4f1fd5368b000744135
This commit is contained in:
parent
daa4710a0a
commit
9bdb8199cc
@ -52,12 +52,6 @@ class tripleo::firewall::pre(
|
|||||||
tag => 'tripleo-firewall-prerule',
|
tag => 'tripleo-firewall-prerule',
|
||||||
}
|
}
|
||||||
|
|
||||||
tripleo::firewall::rule{ '003 accept ssh':
|
|
||||||
dport => '22',
|
|
||||||
extras => $firewall_settings,
|
|
||||||
tag => 'tripleo-firewall-prerule',
|
|
||||||
}
|
|
||||||
|
|
||||||
tripleo::firewall::rule{ '004 accept ipv6 dhcpv6':
|
tripleo::firewall::rule{ '004 accept ipv6 dhcpv6':
|
||||||
dport => '546',
|
dport => '546',
|
||||||
proto => 'udp',
|
proto => 'udp',
|
||||||
|
@ -69,19 +69,6 @@ describe 'tripleo::firewall' do
|
|||||||
:state => ['NEW'],
|
:state => ['NEW'],
|
||||||
:provider => 'ip6tables',
|
:provider => 'ip6tables',
|
||||||
)
|
)
|
||||||
is_expected.to contain_firewall('003 accept ssh ipv4').with(
|
|
||||||
:dport => '22',
|
|
||||||
:proto => 'tcp',
|
|
||||||
:action => 'accept',
|
|
||||||
:state => ['NEW'],
|
|
||||||
)
|
|
||||||
is_expected.to contain_firewall('003 accept ssh ipv6').with(
|
|
||||||
:dport => '22',
|
|
||||||
:proto => 'tcp',
|
|
||||||
:action => 'accept',
|
|
||||||
:state => ['NEW'],
|
|
||||||
:provider => 'ip6tables',
|
|
||||||
)
|
|
||||||
end
|
end
|
||||||
|
|
||||||
it 'configure basic post firewall rules' do
|
it 'configure basic post firewall rules' do
|
||||||
|
Loading…
x
Reference in New Issue
Block a user