mirror of
https://github.com/ansible-collections/ansible.posix.git
synced 2026-01-12 15:45:20 +01:00
Do Not Merge - This is test PR for CI test
Signed-off-by: Hideki Saito <saito@fgrep.org>
This commit is contained in:
parent
6b7dc6ee0a
commit
2352398c86
4 changed files with 24 additions and 21 deletions
3
changelogs/fragments/DNM_ci_tests_20221215.yml
Normal file
3
changelogs/fragments/DNM_ci_tests_20221215.yml
Normal file
|
|
@ -0,0 +1,3 @@
|
||||||
|
---
|
||||||
|
trivial:
|
||||||
|
- DNM - this is test PR for CI trigger.
|
||||||
|
|
@ -82,13 +82,13 @@ options:
|
||||||
description:
|
description:
|
||||||
- Should this configuration be in the running firewalld configuration or persist across reboots.
|
- Should this configuration be in the running firewalld configuration or persist across reboots.
|
||||||
- As of Ansible 2.3, permanent operations can operate on firewalld configs when it is not running (requires firewalld >= 0.3.9).
|
- As of Ansible 2.3, permanent operations can operate on firewalld configs when it is not running (requires firewalld >= 0.3.9).
|
||||||
- Note that if this is C(no), immediate is assumed C(yes).
|
- Note that if this is C(false), immediate is assumed C(true).
|
||||||
type: bool
|
type: bool
|
||||||
immediate:
|
immediate:
|
||||||
description:
|
description:
|
||||||
- Should this configuration be applied immediately, if set as permanent.
|
- Should this configuration be applied immediately, if set as permanent.
|
||||||
type: bool
|
type: bool
|
||||||
default: no
|
default: false
|
||||||
state:
|
state:
|
||||||
description:
|
description:
|
||||||
- Enable or disable a setting.
|
- Enable or disable a setting.
|
||||||
|
|
@ -141,29 +141,29 @@ EXAMPLES = r'''
|
||||||
- name: permit traffic in default zone for https service
|
- name: permit traffic in default zone for https service
|
||||||
ansible.posix.firewalld:
|
ansible.posix.firewalld:
|
||||||
service: https
|
service: https
|
||||||
permanent: yes
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
|
|
||||||
- name: do not permit traffic in default zone on port 8081/tcp
|
- name: do not permit traffic in default zone on port 8081/tcp
|
||||||
ansible.posix.firewalld:
|
ansible.posix.firewalld:
|
||||||
port: 8081/tcp
|
port: 8081/tcp
|
||||||
permanent: yes
|
permanent: true
|
||||||
state: disabled
|
state: disabled
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
port: 161-162/udp
|
port: 161-162/udp
|
||||||
permanent: yes
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
zone: dmz
|
zone: dmz
|
||||||
service: http
|
service: http
|
||||||
permanent: yes
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
rich_rule: rule service name="ftp" audit limit value="1/m" accept
|
rich_rule: rule service name="ftp" audit limit value="1/m" accept
|
||||||
permanent: yes
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
|
|
@ -174,44 +174,44 @@ EXAMPLES = r'''
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
zone: trusted
|
zone: trusted
|
||||||
interface: eth2
|
interface: eth2
|
||||||
permanent: yes
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
masquerade: yes
|
masquerade: true
|
||||||
state: enabled
|
state: enabled
|
||||||
permanent: yes
|
permanent: true
|
||||||
zone: dmz
|
zone: dmz
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
zone: custom
|
zone: custom
|
||||||
state: present
|
state: present
|
||||||
permanent: yes
|
permanent: true
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
zone: drop
|
zone: drop
|
||||||
state: enabled
|
state: enabled
|
||||||
permanent: yes
|
permanent: true
|
||||||
icmp_block_inversion: yes
|
icmp_block_inversion: true
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
zone: drop
|
zone: drop
|
||||||
state: enabled
|
state: enabled
|
||||||
permanent: yes
|
permanent: true
|
||||||
icmp_block: echo-request
|
icmp_block: echo-request
|
||||||
|
|
||||||
- ansible.posix.firewalld:
|
- ansible.posix.firewalld:
|
||||||
zone: internal
|
zone: internal
|
||||||
state: present
|
state: present
|
||||||
permanent: yes
|
permanent: true
|
||||||
target: ACCEPT
|
target: ACCEPT
|
||||||
|
|
||||||
- name: Redirect port 443 to 8443 with Rich Rule
|
- name: Redirect port 443 to 8443 with Rich Rule
|
||||||
ansible.posix.firewalld:
|
ansible.posix.firewalld:
|
||||||
rich_rule: rule family=ipv4 forward-port port=443 protocol=tcp to-port=8443
|
rich_rule: rule family=ipv4 forward-port port=443 protocol=tcp to-port=8443
|
||||||
zone: public
|
zone: public
|
||||||
permanent: yes
|
permanent: true
|
||||||
immediate: yes
|
immediate: true
|
||||||
state: enabled
|
state: enabled
|
||||||
'''
|
'''
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -212,7 +212,7 @@ notes:
|
||||||
- link_destination is subject to the same limitations as the underlying rsync daemon. Hard links are only preserved if the relative subtrees
|
- link_destination is subject to the same limitations as the underlying rsync daemon. Hard links are only preserved if the relative subtrees
|
||||||
of the source and destination are the same. Attempts to hardlink into a directory that is a subdirectory of the source will be prevented.
|
of the source and destination are the same. Attempts to hardlink into a directory that is a subdirectory of the source will be prevented.
|
||||||
seealso:
|
seealso:
|
||||||
- module: copy
|
- module: ansible.builtin.copy
|
||||||
- module: community.windows.win_robocopy
|
- module: community.windows.win_robocopy
|
||||||
author:
|
author:
|
||||||
- Timothy Appnel (@tima)
|
- Timothy Appnel (@tima)
|
||||||
|
|
|
||||||
|
|
@ -4,7 +4,7 @@
|
||||||
|
|
||||||
- name: firewalld port range test permanent enabled
|
- name: firewalld port range test permanent enabled
|
||||||
firewalld:
|
firewalld:
|
||||||
port: 5500-6950/tcp
|
port: 5500-6850/tcp
|
||||||
permanent: true
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
register: result
|
register: result
|
||||||
|
|
@ -16,7 +16,7 @@
|
||||||
|
|
||||||
- name: firewalld port range test permanent enabled rerun (verify not changed)
|
- name: firewalld port range test permanent enabled rerun (verify not changed)
|
||||||
firewalld:
|
firewalld:
|
||||||
port: 5500-6950/tcp
|
port: 5500-6850/tcp
|
||||||
permanent: true
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
register: result
|
register: result
|
||||||
|
|
@ -57,7 +57,7 @@
|
||||||
state: disabled
|
state: disabled
|
||||||
loop:
|
loop:
|
||||||
- 6900/tcp
|
- 6900/tcp
|
||||||
- 5500-6950/tcp
|
- 5500-6850/tcp
|
||||||
|
|
||||||
- name: firewalld port test permanent enabled
|
- name: firewalld port test permanent enabled
|
||||||
firewalld:
|
firewalld:
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue