@@ -155,11 +155,13 @@ stackhpc_compute_firewalld_rules_default:
155
155
state: disabled
156
156
zone: "{{ public_net_name | net_zone }}"
157
157
network: "{{ public_net_name }}"
158
+ enabled: true
159
+ - rules:
158
160
- service: ssh
159
161
state: disabled
160
162
zone: "{{ public_net_name | net_zone }}"
161
163
network: "{{ public_net_name }}"
162
- enabled: true
164
+ enabled: "{{ public_net_name | net_zone != provision_oc_net_name | net_zone }}"
163
165
# GENEVE
164
166
- rules:
165
167
- port: 6081/udp
@@ -202,11 +204,13 @@ stackhpc_storage_firewalld_rules_default:
202
204
zone: "{{ provision_oc_net_name | net_zone }}"
203
205
network: "{{ provision_oc_net_name }}"
204
206
state: enabled
207
+ enabled: true
208
+ - rules:
205
209
- service: ssh
206
210
zone: "{{ storage_net_name | net_zone }}"
207
211
network: "{{ storage_net_name }}"
208
212
state: disabled
209
- enabled: true
213
+ enabled: "{{ storage_net_name | net_zone != provision_oc_net_name | net_zone }}"
210
214
# Ceph
211
215
- rules:
212
216
- service: ceph
@@ -219,7 +223,7 @@ stackhpc_storage_firewalld_rules_default:
219
223
state: "{{ 'enabled' if 'mons' in group_names else 'disabled' }}"
220
224
enabled: "{{ stackhpc_enable_ceph | default(false) | bool }}"
221
225
222
- stackhpc_storage_firewalld_extra : []
226
+ stackhpc_storage_firewalld_rules_extra : []
223
227
224
228
###############################################################################
225
229
# Monitoring firewalld rules
@@ -354,20 +358,18 @@ stackhpc_seed_firewalld_rules_default:
354
358
zone: "{{ provision_oc_net_name | net_zone }}"
355
359
network: "{{ provision_oc_net_name }}"
356
360
state: enabled
357
- - service: ntp
358
- zone: "{{ switch_mgmt_net_name | net_zone }}"
359
- network: "{{ switch_mgmt_net_name }}"
360
- state: enabled
361
361
# Disable default services in public zone
362
362
- service: dhcpv6-client
363
363
state: disabled
364
364
zone: "{{ public_net_name | net_zone }}"
365
365
network: "{{ public_net_name }}"
366
+ enabled: true
367
+ - rules:
366
368
- service: ssh
367
369
state: disabled
368
370
zone: "{{ public_net_name | net_zone }}"
369
371
network: "{{ public_net_name }}"
370
- enabled: true
372
+ enabled: "{{ public_net_name | net_zone != provision_oc_net_name | net_zone }}"
371
373
# Pulp server
372
374
- rules:
373
375
- service: http
@@ -399,7 +401,7 @@ stackhpc_seed_firewalld_rules_default:
399
401
zone: "{{ provision_oc_net_name | net_zone }}"
400
402
network: "{{ provision_oc_net_name }}"
401
403
state: enabled
402
- enabled: "{{ kolla_enable_bifrost | bool }}"
404
+ enabled: true #FIXME: Make rules conditional on Bifrost deployment
403
405
# Redfish exporter
404
406
- rules:
405
407
- port: 9610/tcp
0 commit comments