From 0149b0633d423c210db6f979b87092da76b7f95b Mon Sep 17 00:00:00 2001 From: Robert Kaussow Date: Mon, 13 Jun 2022 20:47:12 +0200 Subject: [PATCH] initial commit --- .drone.jsonnet | 159 ++++++++++++++++++ .drone.yml | 152 +++++++++++++++++ .gitignore | 11 ++ .later.yml | 19 +++ .prettierignore | 1 + LICENSE | 21 +++ README.md | 10 ++ defaults/main.yml | 70 ++++++++ handlers/main.yml | 8 + meta/main.yml | 23 +++ molecule/default | 1 + molecule/pytest.ini | 3 + molecule/requirements.yml | 6 + molecule/rocky8/converge.yml | 5 + molecule/rocky8/create.yml | 120 +++++++++++++ molecule/rocky8/destroy.yml | 78 +++++++++ molecule/rocky8/molecule.yml | 24 +++ molecule/rocky8/prepare.yml | 15 ++ molecule/rocky8/tests/test_default.py | 7 + setup.cfg | 12 ++ tasks/main.yml | 2 + tasks/setup.yml | 95 +++++++++++ templates/etc/firewalld/firewalld.conf.j2 | 78 +++++++++ templates/etc/firewalld/ipsets/ipset.xml.j2 | 0 .../etc/firewalld/services/service.xml.j2 | 0 templates/etc/firewalld/zones/zone.xml.j2 | 42 +++++ 26 files changed, 962 insertions(+) create mode 100644 .drone.jsonnet create mode 100644 .drone.yml create mode 100644 .gitignore create mode 100644 .later.yml create mode 100644 .prettierignore create mode 100644 LICENSE create mode 100644 README.md create mode 100644 defaults/main.yml create mode 100644 handlers/main.yml create mode 100644 meta/main.yml create mode 120000 molecule/default create mode 100644 molecule/pytest.ini create mode 100644 molecule/requirements.yml create mode 100644 molecule/rocky8/converge.yml create mode 100644 molecule/rocky8/create.yml create mode 100644 molecule/rocky8/destroy.yml create mode 100644 molecule/rocky8/molecule.yml create mode 100644 molecule/rocky8/prepare.yml create mode 100644 molecule/rocky8/tests/test_default.py create mode 100644 setup.cfg create mode 100644 tasks/main.yml create mode 100644 tasks/setup.yml create mode 100644 templates/etc/firewalld/firewalld.conf.j2 create mode 100644 templates/etc/firewalld/ipsets/ipset.xml.j2 create mode 100644 templates/etc/firewalld/services/service.xml.j2 create mode 100644 templates/etc/firewalld/zones/zone.xml.j2 diff --git a/.drone.jsonnet b/.drone.jsonnet new file mode 100644 index 0000000..0f3b5c4 --- /dev/null +++ b/.drone.jsonnet @@ -0,0 +1,159 @@ +local PipelineLinting = { + kind: 'pipeline', + name: 'linting', + platform: { + os: 'linux', + arch: 'amd64', + }, + steps: [ + { + name: 'ansible-later', + image: 'thegeeklab/ansible-later', + commands: [ + 'ansible-later', + ], + }, + { + name: 'python-format', + image: 'python:3.9', + environment: { + PY_COLORS: 1, + }, + commands: [ + 'pip install -qq yapf', + '[ ! -z "$(find . -type f -name *.py)" ] && yapf -rd ./', + ], + }, + { + name: 'python-flake8', + image: 'python:3.9', + environment: { + PY_COLORS: 1, + }, + commands: [ + 'pip install -qq flake8', + 'flake8', + ], + }, + ], + trigger: { + ref: ['refs/heads/master', 'refs/tags/**', 'refs/pull/**'], + }, +}; + +local PipelineDeployment(scenario='rocky8') = { + kind: 'pipeline', + name: 'testing-' + scenario, + platform: { + os: 'linux', + arch: 'amd64', + }, + concurrency: { + limit: 1, + }, + workspace: { + base: '/drone/src', + path: '${DRONE_REPO_NAME}', + }, + steps: [ + { + name: 'ansible-molecule', + image: 'thegeeklab/molecule:3', + environment: { + HCLOUD_TOKEN: { from_secret: 'hcloud_token' }, + }, + commands: [ + 'molecule test -s ' + scenario, + ], + }, + ], + depends_on: [ + 'linting', + ], + trigger: { + ref: ['refs/heads/master', 'refs/tags/**'], + }, +}; + +local PipelineDocumentation = { + kind: 'pipeline', + name: 'documentation', + platform: { + os: 'linux', + arch: 'amd64', + }, + steps: [ + { + name: 'generate', + image: 'thegeeklab/ansible-doctor', + environment: { + ANSIBLE_DOCTOR_LOG_LEVEL: 'INFO', + ANSIBLE_DOCTOR_FORCE_OVERWRITE: true, + ANSIBLE_DOCTOR_EXCLUDE_FILES: 'molecule/', + ANSIBLE_DOCTOR_TEMPLATE: 'hugo-book', + ANSIBLE_DOCTOR_ROLE_NAME: '${DRONE_REPO_NAME#*.}', + ANSIBLE_DOCTOR_OUTPUT_DIR: '_docs/', + }, + }, + { + name: 'publish', + image: 'plugins/gh-pages', + settings: { + remote_url: 'https://gitea.rknet.org/ansible/${DRONE_REPO_NAME}', + netrc_machine: 'gitea.rknet.org', + username: { from_secret: 'gitea_username' }, + password: { from_secret: 'gitea_token' }, + pages_directory: '_docs/', + target_branch: 'docs', + }, + when: { + ref: ['refs/heads/master'], + }, + }, + ], + trigger: { + ref: ['refs/heads/master', 'refs/tags/**', 'refs/pull/**'], + }, + depends_on: [ + 'testing-rocky8', + ], +}; + +local PipelineNotification = { + kind: 'pipeline', + name: 'notification', + platform: { + os: 'linux', + arch: 'amd64', + }, + clone: { + disable: true, + }, + steps: [ + { + name: 'matrix', + image: 'thegeeklab/drone-matrix', + settings: { + homeserver: { from_secret: 'matrix_homeserver' }, + roomid: { from_secret: 'matrix_roomid' }, + template: 'Status: **{{ build.Status }}**
Build: [{{ repo.Owner }}/{{ repo.Name }}]({{ build.Link }}){{#if build.Branch}} ({{ build.Branch }}){{/if}} by {{ commit.Author }}
Message: {{ commit.Message.Title }}', + username: { from_secret: 'matrix_username' }, + password: { from_secret: 'matrix_password' }, + }, + }, + ], + depends_on: [ + 'documentation', + ], + trigger: { + status: ['success', 'failure'], + ref: ['refs/heads/master', 'refs/tags/**'], + }, +}; + +[ + PipelineLinting, + PipelineDeployment(scenario='rocky8'), + PipelineDocumentation, + PipelineNotification, +] diff --git a/.drone.yml b/.drone.yml new file mode 100644 index 0000000..e02c4a6 --- /dev/null +++ b/.drone.yml @@ -0,0 +1,152 @@ +--- +kind: pipeline +name: linting + +platform: + os: linux + arch: amd64 + +steps: + - name: ansible-later + image: thegeeklab/ansible-later + commands: + - ansible-later + + - name: python-format + image: python:3.9 + commands: + - pip install -qq yapf + - "[ ! -z \"$(find . -type f -name *.py)\" ] && yapf -rd ./" + environment: + PY_COLORS: 1 + + - name: python-flake8 + image: python:3.9 + commands: + - pip install -qq flake8 + - flake8 + environment: + PY_COLORS: 1 + +trigger: + ref: + - refs/heads/master + - refs/tags/** + - refs/pull/** + +--- +kind: pipeline +name: testing-rocky8 + +platform: + os: linux + arch: amd64 + +concurrency: + limit: 1 + +workspace: + base: /drone/src + path: ${DRONE_REPO_NAME} + +steps: + - name: ansible-molecule + image: thegeeklab/molecule:3 + commands: + - molecule test -s rocky8 + environment: + HCLOUD_TOKEN: + from_secret: hcloud_token + +trigger: + ref: + - refs/heads/master + - refs/tags/** + +depends_on: + - linting + +--- +kind: pipeline +name: documentation + +platform: + os: linux + arch: amd64 + +steps: + - name: generate + image: thegeeklab/ansible-doctor + environment: + ANSIBLE_DOCTOR_EXCLUDE_FILES: molecule/ + ANSIBLE_DOCTOR_FORCE_OVERWRITE: true + ANSIBLE_DOCTOR_LOG_LEVEL: INFO + ANSIBLE_DOCTOR_OUTPUT_DIR: _docs/ + ANSIBLE_DOCTOR_ROLE_NAME: ${DRONE_REPO_NAME#*.} + ANSIBLE_DOCTOR_TEMPLATE: hugo-book + + - name: publish + image: plugins/gh-pages + settings: + netrc_machine: gitea.rknet.org + pages_directory: _docs/ + password: + from_secret: gitea_token + remote_url: https://gitea.rknet.org/ansible/${DRONE_REPO_NAME} + target_branch: docs + username: + from_secret: gitea_username + when: + ref: + - refs/heads/master + +trigger: + ref: + - refs/heads/master + - refs/tags/** + - refs/pull/** + +depends_on: + - testing-rocky8 + +--- +kind: pipeline +name: notification + +platform: + os: linux + arch: amd64 + +clone: + disable: true + +steps: + - name: matrix + image: thegeeklab/drone-matrix + settings: + homeserver: + from_secret: matrix_homeserver + password: + from_secret: matrix_password + roomid: + from_secret: matrix_roomid + template: "Status: **{{ build.Status }}**
Build: [{{ repo.Owner }}/{{ repo.Name }}]({{ build.Link }}){{#if build.Branch}} ({{ build.Branch }}){{/if}} by {{ commit.Author }}
Message: {{ commit.Message.Title }}" + username: + from_secret: matrix_username + +trigger: + ref: + - refs/heads/master + - refs/tags/** + status: + - success + - failure + +depends_on: + - documentation + +--- +kind: signature +hmac: 619e3b4d02a320a517f1cdf459c386c7227db5fb074a0549f33f5c19d7a69d7f + +... diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..d97b7cd --- /dev/null +++ b/.gitignore @@ -0,0 +1,11 @@ +# ---> Ansible +*.retry +plugins +library + +# ---> Python +# Byte-compiled / optimized / DLL files +__pycache__/ +*.py[cod] +*$py.class + diff --git a/.later.yml b/.later.yml new file mode 100644 index 0000000..0efe5d5 --- /dev/null +++ b/.later.yml @@ -0,0 +1,19 @@ +--- +ansible: + custom_modules: + - iptables_raw + - openssl_pkcs12 + - proxmox_kvm + - ucr + - corenetworks_dns + - corenetworks_token + +rules: + exclude_files: + - molecule/ + - "LICENSE*" + - "**/*.md" + - "**/*.ini" + + exclude_filter: + - LINT0009 diff --git a/.prettierignore b/.prettierignore new file mode 100644 index 0000000..ef05acb --- /dev/null +++ b/.prettierignore @@ -0,0 +1 @@ +.drone* diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..3812eb4 --- /dev/null +++ b/LICENSE @@ -0,0 +1,21 @@ +MIT License + +Copyright (c) 2022 Robert Kaussow + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is furnished +to do so, subject to the following conditions: + +The above copyright notice and this permission notice (including the next +paragraph) shall be included in all copies or substantial portions of the +Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS +FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS +OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, +WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF +OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. diff --git a/README.md b/README.md new file mode 100644 index 0000000..ca9299f --- /dev/null +++ b/README.md @@ -0,0 +1,10 @@ +# xoxys.firewalld + +[![Build Status](https://img.shields.io/drone/build/ansible/xoxys.firewalld?logo=drone&server=https%3A%2F%2Fdrone.rknet.org)](https://drone.rknet.org/ansible/xoxys.firewalld) +[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg?label=license)](LICENSE) + +Setup and configure host firewall with firewalld. You can find the full documentation at [https://galaxy.geekdocs.de](https://galaxy.geekdocs.de/roles/security/firewalld/). + +## License + +This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details. diff --git a/defaults/main.yml b/defaults/main.yml new file mode 100644 index 0000000..4f04a03 --- /dev/null +++ b/defaults/main.yml @@ -0,0 +1,70 @@ +--- +firewalld_default_zone: public +firewalld_allow_zone_drifting: False + +firewalld_ipsets: [] +firewalld_services: [] + +# @var firewalld_zones:example: > +# firewalld_zones: +# - name: "" +# short: "" +# description: "" +# target: "" +# interface: +# - name: "" +# source: +# - address: "" +# - mac: "" +# - ipset: "" +# service: +# - name: "" +# port: +# - { port: "", protocol: "" } +# protocol: +# - value: +# icmp-block: +# - name: +# icmp-block-inversion: true +# masquerade: true +# forward-port: +# - { port: "", protocol: "" } +# source-port: +# - { port: "", protocol: "" } +# rule: +# - source: { address: "", mac: "", ipset: ""} +# destination: { address: "", mac: "", ipset: ""} +# service: {name: ""} +# port: {port: "", protocol: ""} +# protocol: {value: ""} +# icmp-block: +# name: "" +# icmp-type: +# name: "" +# masquerade: true +# forward-port: +# port: "" +# protocol: "" +# to-port: "" +# to-addr: "" +# source-port: +# port: "" +# protocol: "" +# log: +# prefix: "" +# level: "" +# limit: "" +# audit: +# limit: "" +# accept: +# limit: "" +# reject: +# rejecttype: "" +# limit: "" +# drop: +# limit: "" +# mark: +# set: +# limit: "" +# end +firewalld_zones: [] diff --git a/handlers/main.yml b/handlers/main.yml new file mode 100644 index 0000000..349dc0d --- /dev/null +++ b/handlers/main.yml @@ -0,0 +1,8 @@ +--- +- name: Reload firewalld + service: + name: firewalld + state: reloaded + listen: __firewalld_reload + become: True + become_user: root diff --git a/meta/main.yml b/meta/main.yml new file mode 100644 index 0000000..a414135 --- /dev/null +++ b/meta/main.yml @@ -0,0 +1,23 @@ +# Standards: 0.2 +--- +galaxy_info: + # @meta author:value: [Robert Kaussow](https://gitea.rknet.org/xoxys) + author: "Robert Kaussow " + namespace: xoxys + role_name: firewalld + # @meta description: > + # [![Source Code](https://img.shields.io/badge/gitea-source%20code-blue?logo=gitea&logoColor=white)](https://gitea.rknet.org/ansible/xoxys.firewalld) + # [![Build Status](https://img.shields.io/drone/build/ansible/xoxys.firewalld?logo=drone&server=https%3A%2F%2Fdrone.rknet.org)](https://drone.rknet.org/ansible/xoxys.firewalld) + # [![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg?label=license)](https://gitea.rknet.org/ansible/xoxys.firewalld/src/branch/main/LICENSE) + # + # Setup and configure host firewall with firewalld. + # @end + description: Setup and configure host firewall with firewalld + license: MIT + min_ansible_version: 2.10 + platforms: + - name: EL + versions: + - 7 + galaxy_tags: [] +dependencies: [] diff --git a/molecule/default b/molecule/default new file mode 120000 index 0000000..62ea184 --- /dev/null +++ b/molecule/default @@ -0,0 +1 @@ +rocky8 \ No newline at end of file diff --git a/molecule/pytest.ini b/molecule/pytest.ini new file mode 100644 index 0000000..c24fe5b --- /dev/null +++ b/molecule/pytest.ini @@ -0,0 +1,3 @@ +[pytest] +filterwarnings = + ignore::DeprecationWarning diff --git a/molecule/requirements.yml b/molecule/requirements.yml new file mode 100644 index 0000000..46da115 --- /dev/null +++ b/molecule/requirements.yml @@ -0,0 +1,6 @@ +--- +collections: + - name: https://gitea.rknet.org/ansible/xoxys.general/releases/download/v2.1.1/xoxys-general-2.1.1.tar.gz + - name: community.general + +roles: [] diff --git a/molecule/rocky8/converge.yml b/molecule/rocky8/converge.yml new file mode 100644 index 0000000..70635cd --- /dev/null +++ b/molecule/rocky8/converge.yml @@ -0,0 +1,5 @@ +--- +- name: Converge + hosts: all + roles: + - role: xoxys.firewalld diff --git a/molecule/rocky8/create.yml b/molecule/rocky8/create.yml new file mode 100644 index 0000000..719600d --- /dev/null +++ b/molecule/rocky8/create.yml @@ -0,0 +1,120 @@ +--- +- name: Create + hosts: localhost + connection: local + gather_facts: false + no_log: "{{ molecule_no_log }}" + vars: + ssh_port: 22 + ssh_user: root + ssh_path: "{{ lookup('env', 'MOLECULE_EPHEMERAL_DIRECTORY') }}/ssh_key" + tasks: + - name: Create SSH key + user: + name: "{{ lookup('env', 'USER') }}" + generate_ssh_key: true + ssh_key_file: "{{ ssh_path }}" + force: true + register: generated_ssh_key + + - name: Register the SSH key name + set_fact: + ssh_key_name: "molecule-generated-{{ 12345 | random | to_uuid }}" + + - name: Register SSH key for test instance(s) + hcloud_ssh_key: + name: "{{ ssh_key_name }}" + public_key: "{{ generated_ssh_key.ssh_public_key }}" + state: present + + - name: Create molecule instance(s) + hcloud_server: + name: "{{ item.name }}" + server_type: "{{ item.server_type }}" + ssh_keys: + - "{{ ssh_key_name }}" + image: "{{ item.image }}" + location: "{{ item.location | default(omit) }}" + datacenter: "{{ item.datacenter | default(omit) }}" + user_data: "{{ item.user_data | default(omit) }}" + api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}" + state: present + register: server + loop: "{{ molecule_yml.platforms }}" + async: 7200 + poll: 0 + + - name: Wait for instance(s) creation to complete + async_status: + jid: "{{ item.ansible_job_id }}" + register: hetzner_jobs + until: hetzner_jobs.finished + retries: 300 + loop: "{{ server.results }}" + + - name: Create volume(s) + hcloud_volume: + name: "{{ item.name }}" + server: "{{ item.name }}" + location: "{{ item.location | default(omit) }}" + size: "{{ item.volume_size | default(10) }}" + api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}" + state: "present" + loop: "{{ molecule_yml.platforms }}" + when: item.volume | default(False) | bool + register: volumes + async: 7200 + poll: 0 + + - name: Wait for volume(s) creation to complete + async_status: + jid: "{{ item.ansible_job_id }}" + register: hetzner_volumes + until: hetzner_volumes.finished + retries: 300 + when: volumes.changed + loop: "{{ volumes.results }}" + + # Mandatory configuration for Molecule to function. + + - name: Populate instance config dict + set_fact: + instance_conf_dict: + { + "instance": "{{ item.hcloud_server.name }}", + "ssh_key_name": "{{ ssh_key_name }}", + "address": "{{ item.hcloud_server.ipv4_address }}", + "user": "{{ ssh_user }}", + "port": "{{ ssh_port }}", + "identity_file": "{{ ssh_path }}", + "volume": "{{ item.item.item.volume | default(False) | bool }}", + } + loop: "{{ hetzner_jobs.results }}" + register: instance_config_dict + when: server.changed | bool + + - name: Convert instance config dict to a list + set_fact: + instance_conf: "{{ instance_config_dict.results | map(attribute='ansible_facts.instance_conf_dict') | list }}" + when: server.changed | bool + + - name: Dump instance config + copy: + content: | + # Molecule managed + + {{ instance_conf | to_nice_yaml(indent=2) }} + dest: "{{ molecule_instance_config }}" + when: server.changed | bool + + - name: Wait for SSH + wait_for: + port: "{{ ssh_port }}" + host: "{{ item.address }}" + search_regex: SSH + delay: 10 + loop: "{{ lookup('file', molecule_instance_config) | from_yaml }}" + + - name: Wait for VM to settle down + pause: + seconds: 30 \ No newline at end of file diff --git a/molecule/rocky8/destroy.yml b/molecule/rocky8/destroy.yml new file mode 100644 index 0000000..ed0b2ed --- /dev/null +++ b/molecule/rocky8/destroy.yml @@ -0,0 +1,78 @@ +--- +- name: Destroy + hosts: localhost + connection: local + gather_facts: false + no_log: "{{ molecule_no_log }}" + tasks: + - name: Check existing instance config file + stat: + path: "{{ molecule_instance_config }}" + register: cfg + + - name: Populate the instance config + set_fact: + instance_conf: "{{ (lookup('file', molecule_instance_config) | from_yaml) if cfg.stat.exists else [] }}" + + - name: Destroy molecule instance(s) + hcloud_server: + name: "{{ item.instance }}" + api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}" + state: absent + register: server + loop: "{{ instance_conf }}" + async: 7200 + poll: 0 + + - name: Wait for instance(s) deletion to complete + async_status: + jid: "{{ item.ansible_job_id }}" + register: hetzner_jobs + until: hetzner_jobs.finished + retries: 300 + loop: "{{ server.results }}" + + - pause: + seconds: 5 + + - name: Destroy volume(s) + hcloud_volume: + name: "{{ item.instance }}" + server: "{{ item.instance }}" + api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}" + state: "absent" + register: volumes + loop: "{{ instance_conf }}" + when: item.volume | default(False) | bool + async: 7200 + poll: 0 + + - name: Wait for volume(s) deletion to complete + async_status: + jid: "{{ item.ansible_job_id }}" + register: hetzner_volumes + until: hetzner_volumes.finished + retries: 300 + when: volumes.changed + loop: "{{ volumes.results }}" + + - name: Remove registered SSH key + hcloud_ssh_key: + name: "{{ instance_conf[0].ssh_key_name }}" + state: absent + when: (instance_conf | default([])) | length > 0 + + # Mandatory configuration for Molecule to function. + + - name: Populate instance config + set_fact: + instance_conf: {} + + - name: Dump instance config + copy: + content: | + # Molecule managed + + {{ instance_conf | to_nice_yaml(indent=2) }} + dest: "{{ molecule_instance_config }}" + when: server.changed | bool \ No newline at end of file diff --git a/molecule/rocky8/molecule.yml b/molecule/rocky8/molecule.yml new file mode 100644 index 0000000..5049b2d --- /dev/null +++ b/molecule/rocky8/molecule.yml @@ -0,0 +1,24 @@ +--- +dependency: + name: galaxy + options: + role-file: molecule/requirements.yml + requirements-file: molecule/requirements.yml + env: + ANSIBLE_GALAXY_DISPLAY_PROGRESS: "false" +driver: + name: delegated +platforms: + - name: rocky8-firewalld + image: rocky-8 + server_type: cx11 +lint: | + /usr/local/bin/flake8 +provisioner: + name: ansible + env: + ANSIBLE_FILTER_PLUGINS: ${ANSIBLE_FILTER_PLUGINS:-./plugins/filter} + ANSIBLE_LIBRARY: ${ANSIBLE_LIBRARY:-./library} + log: False +verifier: + name: testinfra diff --git a/molecule/rocky8/prepare.yml b/molecule/rocky8/prepare.yml new file mode 100644 index 0000000..183f4d3 --- /dev/null +++ b/molecule/rocky8/prepare.yml @@ -0,0 +1,15 @@ +--- +- name: Prepare + hosts: all + gather_facts: false + tasks: + - name: Bootstrap python for Ansible + raw: | + command -v python3 python || ( + (test -e /usr/bin/dnf && sudo dnf install -y python3) || + (test -e /usr/bin/apt && (apt -y update && apt install -y python-minimal)) || + (test -e /usr/bin/yum && sudo yum -y -qq install python3) || + echo "Warning: Python not boostrapped due to unknown platform." + ) + become: true + changed_when: false diff --git a/molecule/rocky8/tests/test_default.py b/molecule/rocky8/tests/test_default.py new file mode 100644 index 0000000..18236da --- /dev/null +++ b/molecule/rocky8/tests/test_default.py @@ -0,0 +1,7 @@ +import os + +import testinfra.utils.ansible_runner + +testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner( + os.environ["MOLECULE_INVENTORY_FILE"] +).get_hosts("all") diff --git a/setup.cfg b/setup.cfg new file mode 100644 index 0000000..2bb8674 --- /dev/null +++ b/setup.cfg @@ -0,0 +1,12 @@ +[flake8] +ignore = D100, D101, D102, D103, D105, D107, E402, W503 +max-line-length = 99 +inline-quotes = double +exclude = .git,.tox,__pycache__,build,dist,tests,*.pyc,*.egg-info,.cache,.eggs,env* + +[yapf] +based_on_style = google +column_limit = 99 +dedent_closing_brackets = true +coalesce_brackets = true +split_before_logical_operator = true diff --git a/tasks/main.yml b/tasks/main.yml new file mode 100644 index 0000000..1f69f7a --- /dev/null +++ b/tasks/main.yml @@ -0,0 +1,2 @@ +--- +- include_tasks: setup.yml diff --git a/tasks/setup.yml b/tasks/setup.yml new file mode 100644 index 0000000..1cf72ab --- /dev/null +++ b/tasks/setup.yml @@ -0,0 +1,95 @@ +--- +- block: + - name: Install packages + package: + name: "{{ item }}" + loop: + - firewalld + - python3-firewall + + - name: Configure firewalld ipsets + template: + src: etc/firewalld/ipsets/ipset.xml.j2 + dest: /etc/firewalld/ipsets/{{ item.name }}.xml + loop: "{{ firewalld_ipsets }}" + loop_control: + label: "{{ item.name }}" + notify: __firewalld_reload + + - name: Register active ipsets + find: + paths: /etc/firewalld/ipsets + file_type: file + patterns: "*.xml" + register: __firewalld_ipsets_active + changed_when: false + failed_when: false + + - name: Remove unmanaged ipsets + file: + path: "/etc/firewalld/ipsets/{{ item }}" + state: absent + loop: "{{ __firewalld_ipsets_active.files | map(attribute='path') | list }}" + notify: __firewalld_reload + when: item | replace('.xml','') not in firewalld_ipsets | map(attribute='name') | list + + - name: Configure firewalld services + template: + src: etc/firewalld/services/service.xml.j2 + dest: /etc/firewalld/services/{{ item.name }}.xml + loop: "{{ firewalld_services }}" + loop_control: + label: "{{ item.name }}" + notify: __firewalld_reload + + - name: Register active services + find: + paths: /etc/firewalld/services + file_type: file + patterns: "*.xml" + register: __firewalld_services_active + changed_when: false + failed_when: false + + - name: Remove unmanaged services + file: + path: "/etc/firewalld/services/{{ item }}" + state: absent + loop: "{{ __firewalld_services_active.files | map(attribute='path') | list }}" + notify: __firewalld_reload + when: item | replace('.xml','') not in firewalld_services | map(attribute='name') | list + + - name: Configure firewalld zones + template: + src: etc/firewalld/zones/zone.xml.j2 + dest: /etc/firewalld/zones/{{ item.name }}.xml + loop: "{{ firewalld_zones }}" + loop_control: + label: "{{ item.name }}" + notify: __firewalld_reload + + - name: Register active zones + find: + paths: /etc/firewalld/zones + file_type: file + patterns: "*.xml" + register: __firewalld_zones_active + changed_when: false + failed_when: false + + - name: Remove unmanaged zones + file: + path: "/etc/firewalld/zones/{{ item }}" + state: absent + loop: "{{ __firewalld_zones_active.files | map(attribute='path') | list }}" + notify: __firewalld_reload + when: item | replace('.xml','') not in firewalld_zones | map(attribute='name') | list + + - name: Ensure service is up and running + service: + name: firewalld + daemon_reload: True + enabled: True + state: started + become: True + become_user: root diff --git a/templates/etc/firewalld/firewalld.conf.j2 b/templates/etc/firewalld/firewalld.conf.j2 new file mode 100644 index 0000000..404be15 --- /dev/null +++ b/templates/etc/firewalld/firewalld.conf.j2 @@ -0,0 +1,78 @@ +#jinja2: lstrip_blocks: True +{{ ansible_managed | comment }} + +# default zone +# The default zone used if an empty zone string is used. +# Default: public +DefaultZone={{ firewalld_default_zone }} + +# Clean up on exit +# If set to no or false the firewall configuration will not get cleaned up +# on exit or stop of firewalld +# Default: yes +CleanupOnExit=yes + +# Lockdown +# If set to enabled, firewall changes with the D-Bus interface will be limited +# to applications that are listed in the lockdown whitelist. +# The lockdown whitelist file is lockdown-whitelist.xml +# Default: no +Lockdown=no + +# IPv6_rpfilter +# Performs a reverse path filter test on a packet for IPv6. If a reply to the +# packet would be sent via the same interface that the packet arrived on, the +# packet will match and be accepted, otherwise dropped. +# The rp_filter for IPv4 is controlled using sysctl. +# Note: This feature has a performance impact. See man page FIREWALLD.CONF(5) +# for details. +# Default: yes +IPv6_rpfilter=yes + +# IndividualCalls +# Do not use combined -restore calls, but individual calls. This increases the +# time that is needed to apply changes and to start the daemon, but is good for +# debugging. +# Default: no +IndividualCalls=no + +# LogDenied +# Add logging rules right before reject and drop rules in the INPUT, FORWARD +# and OUTPUT chains for the default rules and also final reject and drop rules +# in zones. Possible values are: all, unicast, broadcast, multicast and off. +# Default: off +LogDenied=off + +# FirewallBackend +# Selects the firewall backend implementation. +# Choices are: +# - nftables (default) +# - iptables (iptables, ip6tables, ebtables and ipset) +FirewallBackend=nftables + +# FlushAllOnReload +# Flush all runtime rules on a reload. In previous releases some runtime +# configuration was retained during a reload, namely; interface to zone +# assignment, and direct rules. This was confusing to users. To get the old +# behavior set this to "no". +# Default: yes +FlushAllOnReload=yes + +# RFC3964_IPv4 +# As per RFC 3964, filter IPv6 traffic with 6to4 destination addresses that +# correspond to IPv4 addresses that should not be routed over the public +# internet. +# Defaults to "yes". +RFC3964_IPv4=yes + +# AllowZoneDrifting +# Older versions of firewalld had undocumented behavior known as "zone +# drifting". This allowed packets to ingress multiple zones - this is a +# violation of zone based firewalls. However, some users rely on this behavior +# to have a "catch-all" zone, e.g. the default zone. You can enable this if you +# desire such behavior. It's disabled by default for security reasons. +# Note: If "yes" packets will only drift from source based zones to interface +# based zones (including the default zone). Packets never drift from interface +# based zones to other interfaces based zones (including the default zone). +# Possible values; "yes", "no". Defaults to "yes". +AllowZoneDrifting={{ firewalld_allow_zone_drifting | bool | ternary("yes", "no", "no") }} diff --git a/templates/etc/firewalld/ipsets/ipset.xml.j2 b/templates/etc/firewalld/ipsets/ipset.xml.j2 new file mode 100644 index 0000000..e69de29 diff --git a/templates/etc/firewalld/services/service.xml.j2 b/templates/etc/firewalld/services/service.xml.j2 new file mode 100644 index 0000000..e69de29 diff --git a/templates/etc/firewalld/zones/zone.xml.j2 b/templates/etc/firewalld/zones/zone.xml.j2 new file mode 100644 index 0000000..26f6b44 --- /dev/null +++ b/templates/etc/firewalld/zones/zone.xml.j2 @@ -0,0 +1,42 @@ +#jinja2: lstrip_blocks: True +{{ ansible_managed | comment("xml") }} + + + + {{ item.short | default(item.name) | upper }} +{% if item.description is defined %} + {{ item.description }} +{% endif %} +{% if item | lenght > 0 %} + +{% for tag in item %} + {# Settings which can be used several times #} + {% if tag in ['interface','source','service','port','protocol','icmp-block','forward-port','source-port'] %} + {% for subtag in item[tag] %} + <{{ tag }}{% for name,value in subtag.items() %} {{ name }}="{{ value }}"{% endfor %}/> + {% endfor %} + {# Settings which can be used once #} + {% elif tag in ['icmp-block-inversion','masquerade'] and item[tag] == True %} + <{{ tag }}/> + {% endif %} +{% endfor %} +{% endif %} +{% if item.rule | default([]) | length > 0 %} + +{% for rule in item.rule | default([]) %} + + {% for tag in rule %} + {% if tag in ['source','destination','service','port','icmp-block','icmp-type','masquerade','forward-port'] %} + <{{ tag }}{% for name,value in tag.items() | default({}) %} {{ name }}="{{ value }}"{% endfor %}/> + {% elif tag in ['log','audit','accept','drop','mark','reject'] %} + <{{ tag }}{% for name,value in tag.items() %} {{ name }}="{{ value }}"{% endfor %}> + {% endif %} + {% if tag.limit is defined %} + + {% endif %} + + {% endfor %} + +{% endfor %} +{% endif %} +