puppet-tripleo/manifests/firewall/pre.pp
Lars Kellogg-Stedman 9bdb8199cc remove ssh from tripleo::firewall::pre
including global ssh access in tripleo::firewall::pre makes it
difficult for the operator to control ssh access to overcloud hosts.
This removes the hardcoded rule and the accompanying change in t-h-t
configures the default firewall rules via hiera config_settings.

Depends-On: I89cff59947dda3f51482486c41a3d67c4aa36a3e
Change-Id: I14b540e6564c5b7c5d54b4f1fd5368b000744135
2018-12-19 03:40:04 +00:00

63 lines
1.7 KiB
Puppet

#
# Copyright (C) 2015 eNovance SAS <licensing@enovance.com>
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: tripleo::firewall::pre
#
# Firewall rules during 'pre' Puppet stage
#
# === Parameters:
#
# [*firewall_settings*]
# (optional) Allow to add custom parameters to firewall rules
# Should be an hash.
# Default to {}
#
class tripleo::firewall::pre(
$firewall_settings = {},
){
# ensure the correct packages are installed
include ::firewall
# defaults 'pre' rules
tripleo::firewall::rule{ '000 accept related established rules':
proto => 'all',
state => ['RELATED', 'ESTABLISHED'],
extras => $firewall_settings,
tag => 'tripleo-firewall-prerule',
}
tripleo::firewall::rule{ '001 accept all icmp':
proto => 'icmp',
extras => $firewall_settings,
tag => 'tripleo-firewall-prerule',
}
tripleo::firewall::rule{ '002 accept all to lo interface':
proto => 'all',
iniface => 'lo',
extras => $firewall_settings,
tag => 'tripleo-firewall-prerule',
}
tripleo::firewall::rule{ '004 accept ipv6 dhcpv6':
dport => '546',
proto => 'udp',
state => ['NEW'],
destination => 'fe80::/64',
tag => 'tripleo-firewall-prerule',
}
}