diff options
author | darkgallium <darkgallium@deuxfleurs.fr> | 2020-07-13 19:59:17 +0200 |
---|---|---|
committer | darkgallium <darkgallium@deuxfleurs.fr> | 2020-07-13 19:59:17 +0200 |
commit | 75a72af70baa7be5a2e201d75b95e0bdc49c328a (patch) | |
tree | 0896d4fe40c4ff5a91656fbaa5ec9c6d5be468fd /ansible/roles/network | |
parent | c12dcd6d21e33df4bd3c81e4ecd3394d8b449898 (diff) | |
parent | 46aac4cc7909b2ad0faf6f0822b15c405e30ef22 (diff) | |
download | infrastructure-75a72af70baa7be5a2e201d75b95e0bdc49c328a.tar.gz infrastructure-75a72af70baa7be5a2e201d75b95e0bdc49c328a.zip |
Merge pull request 'Simplify iptables' (#16) from feature/simpleiptables into master
Reviewed-on: https://git.deuxfleurs.fr/Deuxfleurs/deuxfleurs.fr/pulls/16
Diffstat (limited to 'ansible/roles/network')
-rw-r--r-- | ansible/roles/network/templates/rules.v4.j2 | 37 |
1 files changed, 1 insertions, 36 deletions
diff --git a/ansible/roles/network/templates/rules.v4.j2 b/ansible/roles/network/templates/rules.v4.j2 index cb935e8..2685b51 100644 --- a/ansible/roles/network/templates/rules.v4.j2 +++ b/ansible/roles/network/templates/rules.v4.j2 @@ -1,42 +1,10 @@ -# WARNING!! When rules.{v4,v6} are changed, the whole iptables configuration is reloaded. -# This creates issues with Docker, which injects its own configuration in iptables when it starts. -# In practice, most (all?) containers will break if rules.{v4,v6} are changed, -# and docker will have to be restared. - - *filter :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT ACCEPT [0:0] -# DNS --A INPUT -p udp --dport 53 -j ACCEPT --A INPUT -p tcp --dport 53 -j ACCEPT - -# Email --A INPUT -p tcp --dport 993 -j ACCEPT --A INPUT -p tcp --dport 25 -j ACCEPT --A INPUT -p tcp --dport 465 -j ACCEPT --A INPUT -p tcp --dport 587 -j ACCEPT - -# Old SSH configuration --A INPUT -p tcp --dport 110 -j ACCEPT - -# New SSH configuration --A INPUT -p tcp --dport 22 -j ACCEPT - -# LDAP --A INPUT -p tcp --dport 389 -j ACCEPT - -# Web --A INPUT -p tcp --dport 80 -j ACCEPT --A INPUT -p tcp --dport 443 -j ACCEPT - -# Jitsi --A INPUT -p tcp --dport 8080 -j ACCEPT --A INPUT -p udp --dport 10000 -j ACCEPT - # Cluster +-A INPUT -p tcp --dport 22 -j ACCEPT -A INPUT -s 192.168.1.254 -j ACCEPT # router {% for selected_host in groups['cluster_nodes'] %} -A INPUT -s {{ hostvars[selected_host]['public_ip'] }} -j ACCEPT @@ -52,7 +20,6 @@ COMMIT - *nat :PREROUTING ACCEPT [0:0] :INPUT ACCEPT [0:0] @@ -70,5 +37,3 @@ COMMIT :POSTROUTING ACCEPT [0:0] COMMIT - - |