2016-09-03 21:43:40 +02:00
|
|
|
# == State: firewalld.ipsets
|
|
|
|
#
|
|
|
|
# This state ensures that /etc/firewalld/ipsets/ exists.
|
|
|
|
#
|
|
|
|
{% from "firewalld/map.jinja" import firewalld with context %}
|
|
|
|
|
|
|
|
{%- if salt['pillar.get']('firewalld:ipset') %}
|
|
|
|
package_ipset:
|
|
|
|
pkg.installed:
|
|
|
|
- name: {{ firewalld.ipsetpackage }}
|
|
|
|
|
|
|
|
directory_firewalld_ipsets:
|
|
|
|
file.directory: # make sure this is a directory
|
|
|
|
- name: /etc/firewalld/ipsets
|
|
|
|
- user: root
|
|
|
|
- group: root
|
|
|
|
- mode: 750
|
|
|
|
- require:
|
|
|
|
- pkg: package_firewalld # make sure package is installed
|
2017-03-10 20:14:51 +01:00
|
|
|
- require_in:
|
|
|
|
- service: service_firewalld
|
|
|
|
- watch_in:
|
|
|
|
- cmd: reload_firewalld # reload firewalld config
|
2016-09-03 21:43:40 +02:00
|
|
|
|
|
|
|
# == Define: firewalld.ipsets
|
|
|
|
#
|
|
|
|
# This defines a ipset configuration, see firewalld.ipset (5) man page.
|
|
|
|
#
|
|
|
|
{% for k, v in salt['pillar.get']('firewalld:ipsets', {}).items() %}
|
|
|
|
{% set z_name = v.name|default(k) %}
|
|
|
|
|
|
|
|
/etc/firewalld/ipsets/{{ z_name }}.xml:
|
|
|
|
file.managed:
|
|
|
|
- name: /etc/firewalld/ipsets/{{ z_name }}.xml
|
|
|
|
- user: root
|
|
|
|
- group: root
|
|
|
|
- mode: 644
|
|
|
|
- source: salt://firewalld/files/ipset.xml
|
|
|
|
- template: jinja
|
|
|
|
- require:
|
|
|
|
- pkg: package_firewalld # make sure package is installed
|
|
|
|
- file: directory_firewalld_ipsets
|
2017-03-10 20:14:51 +01:00
|
|
|
- require_in:
|
|
|
|
- service: service_firewalld
|
|
|
|
- watch_in:
|
|
|
|
- cmd: reload_firewalld # reload firewalld config
|
2016-09-03 21:43:40 +02:00
|
|
|
- context:
|
|
|
|
name: {{ z_name }}
|
|
|
|
ipset: {{ v }}
|
|
|
|
|
|
|
|
{% endfor %}
|
|
|
|
{%- endif %}
|