feat: Create role
This commit is contained in:
parent
69eeff1e45
commit
b79180cd6c
2
.gitignore
vendored
2
.gitignore
vendored
@ -21,4 +21,4 @@ tags
|
|||||||
|
|
||||||
# ---> Ansible
|
# ---> Ansible
|
||||||
*.retry
|
*.retry
|
||||||
|
.ansible
|
||||||
|
66
README.md
66
README.md
@ -1,3 +1,65 @@
|
|||||||
# role_modele
|
# role_nftables
|
||||||
|
|
||||||
Modèle
|
Allow to install, enable and manage nftables.
|
||||||
|
|
||||||
|
## Variables
|
||||||
|
|
||||||
|
### nftables_conf_template
|
||||||
|
|
||||||
|
Template deployed as nftables configuration.
|
||||||
|
|
||||||
|
*<span style="text-decoration: underline">Default value:</span> false*
|
||||||
|
|
||||||
|
### nftables_conf_path
|
||||||
|
|
||||||
|
Configuration fullpath of nftables.
|
||||||
|
|
||||||
|
*<span style="text-decoration: underline">Default value:</span> false*
|
||||||
|
|
||||||
|
### nftables_rules_*
|
||||||
|
|
||||||
|
List of dicts containing rules to deploy with comment and associated rules.
|
||||||
|
|
||||||
|
*<span style="text-decoration: underline">Default value:</span> none*
|
||||||
|
|
||||||
|
## Usages
|
||||||
|
|
||||||
|
### inventory.yml
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
---
|
||||||
|
|
||||||
|
all:
|
||||||
|
hosts:
|
||||||
|
host1.ykn.local:
|
||||||
|
host2.ykn.local:
|
||||||
|
children:
|
||||||
|
dnsservers:
|
||||||
|
hosts:
|
||||||
|
host1.ykn.local:
|
||||||
|
host2.ykn.local:
|
||||||
|
```
|
||||||
|
|
||||||
|
### group_vars/dnsservers.yml
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
---
|
||||||
|
|
||||||
|
nftables_rules_dnsservers:
|
||||||
|
- comment: Allow LAN to dns
|
||||||
|
rules:
|
||||||
|
- "ip saddr 192.168.93.0/24 meta l4proto {tcp, udp} th dport 53 accept"
|
||||||
|
- "ip6 saddr abcd:ef9:8765:895::/64 meta l4proto {tcp, udp} th dport 53 accept"
|
||||||
|
- "ip6 saddr fe80::/64 meta l4proto {tcp, udp} th dport 53 accept"
|
||||||
|
```
|
||||||
|
|
||||||
|
### host_vars/host1.ykn.local.yml
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
---
|
||||||
|
|
||||||
|
nftables_rules_host:
|
||||||
|
- comment: Allow ANY to https
|
||||||
|
rules:
|
||||||
|
- "tcp dport 443 accept"
|
||||||
|
```
|
||||||
|
11
defaults/main.yml
Normal file
11
defaults/main.yml
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
---
|
||||||
|
# defaults file for nftables
|
||||||
|
|
||||||
|
# Template used to configure nftables
|
||||||
|
nftables_conf_template: nftables.conf.j2
|
||||||
|
|
||||||
|
# Default configuration path
|
||||||
|
nftables_conf_path: /etc/nftables.conf
|
||||||
|
|
||||||
|
# List of rules to deploy
|
||||||
|
nftables_rules: []
|
10
handlers/main.yml
Normal file
10
handlers/main.yml
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
---
|
||||||
|
# handlers file for nftables
|
||||||
|
|
||||||
|
- name: Restart nftables.service
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: nftables.service
|
||||||
|
state: restarted
|
||||||
|
enabled: true
|
||||||
|
masked: false
|
||||||
|
become: true
|
@ -1,7 +1,7 @@
|
|||||||
galaxy_info:
|
galaxy_info:
|
||||||
namespace: ykn
|
namespace: ykn
|
||||||
author: pulsar89.5
|
author: pulsar89.5
|
||||||
description: Rôle modèle
|
description: Rôle de déploiement de nftables (pare-feu)
|
||||||
|
|
||||||
license: GPL-3.0-or-later
|
license: GPL-3.0-or-later
|
||||||
|
|
||||||
|
20
tasks/configuration.yml
Normal file
20
tasks/configuration.yml
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
---
|
||||||
|
# tasks file for nftables
|
||||||
|
|
||||||
|
- name: Build rules list
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
nftables_rules: "{{ nftables_rules + specific }}"
|
||||||
|
when: specific | length > 0
|
||||||
|
loop: "{{ lookup('ansible.builtin.varnames', '^nftables_rules_.+', wantlist=True) }}"
|
||||||
|
vars:
|
||||||
|
specific: "{{ lookup('ansible.builtin.vars', item, default='') }}"
|
||||||
|
|
||||||
|
- name: Deploy configuration file
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ nftables_conf_template }}"
|
||||||
|
dest: "{{ nftables_conf_path }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: u=rw,g=,o=
|
||||||
|
become: true
|
||||||
|
notify: Restart nftables.service
|
8
tasks/installation.yml
Normal file
8
tasks/installation.yml
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
---
|
||||||
|
# tasks file for nftables
|
||||||
|
|
||||||
|
- name: Install nftables
|
||||||
|
ansible.builtin.apt:
|
||||||
|
state: present
|
||||||
|
name: nftables
|
||||||
|
when: ansible_facts['pkg_mgr'] == "apt"
|
10
tasks/main.yml
Normal file
10
tasks/main.yml
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
---
|
||||||
|
# tasks file for nftables
|
||||||
|
|
||||||
|
- name: Include installation tasks
|
||||||
|
ansible.builtin.include_tasks:
|
||||||
|
file: installation.yml
|
||||||
|
|
||||||
|
- name: Import configuration tasks
|
||||||
|
ansible.builtin.import_tasks:
|
||||||
|
file: configuration.yml
|
31
templates/nftables.conf.j2
Normal file
31
templates/nftables.conf.j2
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
#!/usr/sbin/nft -f
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
|
||||||
|
flush ruleset
|
||||||
|
|
||||||
|
table inet filter {
|
||||||
|
chain input {
|
||||||
|
type filter hook input priority 0;
|
||||||
|
|
||||||
|
# Accept any localhost traffic
|
||||||
|
iif lo accept
|
||||||
|
|
||||||
|
# Accept traffic originated from us
|
||||||
|
ct state established,related accept
|
||||||
|
|
||||||
|
# Accept neighbour discovery otherwise IPv6 connectivity breaks.
|
||||||
|
ip6 nexthdr icmpv6 icmpv6 type {nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert} accept
|
||||||
|
|
||||||
|
# Specific rules
|
||||||
|
{% for infos in nftables_rules %}
|
||||||
|
## {{ infos.comment }}
|
||||||
|
{{ infos.rules | join('\n') | indent(width=4, first=false) }}
|
||||||
|
{% if not loop.last %}
|
||||||
|
|
||||||
|
{% endif %}
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
# Count and drop any other traffic
|
||||||
|
counter drop
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user