d5d4cc1094
Via bug https://bugs.launchpad.net/tripleo/+bug/1657108 we need to zero out the default rules in /etc/sysconfig/ip{6}tables in the image. We have done this for ipv4, but when we will do it for ipv6 we will also need to make sure we add a rule for dhcpv6 traffic as it is shipped in the iptables rpm. (See https://bugzilla.redhat.com/show_bug.cgi?id=1169036 for more info) With this change we correctly get the rule present (aka the first ACCEPT line. The second line is due to the stock ip6tables rule I had in my testing): [root@overcloud-controller-0 ~]# iptables -nvL |grep 546 [root@overcloud-controller-0 ~]# ip6tables -nvL |grep 546 0 0 ACCEPT udp * * ::/0 fe80::/64 multiport dports 546 /* 004 accept ipv6 dhcpv6 ipv6 */ state NEW 0 0 ACCEPT udp * * ::/0 fe80::/64 udp dpt:546 state NEW Change-Id: If22080054b2b1fa7acfd101e8c34d2707e8e7864 Partial-Bug: #1657108
64 lines
1.7 KiB
Puppet
64 lines
1.7 KiB
Puppet
#
|
|
# Copyright (C) 2015 eNovance SAS <licensing@enovance.com>
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
# == Class: tripleo::firewall::pre
|
|
#
|
|
# Firewall rules during 'pre' Puppet stage
|
|
#
|
|
# === Parameters:
|
|
#
|
|
# [*firewall_settings*]
|
|
# (optional) Allow to add custom parameters to firewall rules
|
|
# Should be an hash.
|
|
# Default to {}
|
|
#
|
|
class tripleo::firewall::pre(
|
|
$firewall_settings = {},
|
|
){
|
|
|
|
# ensure the correct packages are installed
|
|
include ::firewall
|
|
|
|
# defaults 'pre' rules
|
|
tripleo::firewall::rule{ '000 accept related established rules':
|
|
proto => 'all',
|
|
state => ['RELATED', 'ESTABLISHED'],
|
|
extras => $firewall_settings,
|
|
}
|
|
|
|
tripleo::firewall::rule{ '001 accept all icmp':
|
|
proto => 'icmp',
|
|
extras => $firewall_settings,
|
|
}
|
|
|
|
tripleo::firewall::rule{ '002 accept all to lo interface':
|
|
proto => 'all',
|
|
iniface => 'lo',
|
|
extras => $firewall_settings,
|
|
}
|
|
|
|
tripleo::firewall::rule{ '003 accept ssh':
|
|
dport => '22',
|
|
extras => $firewall_settings,
|
|
}
|
|
|
|
tripleo::firewall::rule{ '004 accept ipv6 dhcpv6':
|
|
dport => '546',
|
|
proto => 'udp',
|
|
state => ['NEW'],
|
|
destination => 'fe80::/64',
|
|
}
|
|
}
|