-
Notifications
You must be signed in to change notification settings - Fork 741
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ufw manage defaults #85
Changes from 2 commits
2750d6e
e34775b
08da409
0f8937c
2f7a97f
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -35,3 +35,8 @@ | |
ignoreerrors: yes | ||
with_dict: '{{ sysctl_rhel_config }}' | ||
when: ansible_distribution == 'RedHat' or ansible_distribution == 'Fedora' or ansible_distribution == 'CentOS' | ||
|
||
- name: Apply ufw defaults | ||
template: src="ufw.j2" dest=/etc/default/ufw | ||
when: ufw_manage_defaults and (ansible_distribution == 'Debian' or ansible_distribution == 'Ubuntu') | ||
tags: dev | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is that tag relevant? Maybe "ufw" is clearer. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
# /etc/default/ufw | ||
# | ||
|
||
# Set to yes to apply rules to support IPv6 (no means only IPv6 on loopback | ||
# accepted). You will need to 'disable' and then 'enable' the firewall for | ||
# the changes to take affect. | ||
IPV6={{ 'no' if sysctl_config['net.ipv6.conf.all.disable_ipv6'] == 1 else 'yes' }} | ||
|
||
# Set the default input policy to ACCEPT, DROP, or REJECT. Please note that if | ||
# you change this you will most likely want to adjust your rules. | ||
DEFAULT_INPUT_POLICY="{{ ufw_default_input_policy }}" | ||
|
||
# Set the default output policy to ACCEPT, DROP, or REJECT. Please note that if | ||
# you change this you will most likely want to adjust your rules. | ||
DEFAULT_OUTPUT_POLICY="{{ ufw_default_output_policy }}" | ||
|
||
# Set the default forward policy to ACCEPT, DROP or REJECT. Please note that | ||
# if you change this you will most likely want to adjust your rules | ||
DEFAULT_FORWARD_POLICY="{{ ufw_default_forward_policy }}" | ||
|
||
# Set the default application policy to ACCEPT, DROP, REJECT or SKIP. Please | ||
# note that setting this to ACCEPT may be a security risk. See 'man ufw' for | ||
# details | ||
DEFAULT_APPLICATION_POLICY="{{ ufw_default_application_policy | default('SKIP') }}" | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Right now, every variable that can be defined, is in the vars or defaults files. This one is not, instead there's a default used. Would you mind setting |
||
|
||
# By default, ufw only touches its own chains. Set this to 'yes' to have ufw | ||
# manage the built-in chains too. Warning: setting this to 'yes' will break | ||
# non-ufw managed firewall rules | ||
MANAGE_BUILTINS="{{ ufw_manage_builtins | default('no') }}" | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Right now, every variable that can be defined, is in the vars or defaults files. This one is not, instead there's a default used. Would you mind setting |
||
|
||
# | ||
# IPT backend | ||
# | ||
# only enable if using iptables backend and want to overwrite /etc/sysctl.conf | ||
{% if ufw_ipt_sysctl == '' %}#{% endif %}IPT_SYSCTL={{ ufw_ipt_sysctl }} | ||
|
||
# Extra connection tracking modules to load. Complete list can be found in | ||
# net/netfilter/Kconfig of your kernel source. Some common modules: | ||
# nf_conntrack_irc, nf_nat_irc: DCC (Direct Client to Client) support | ||
# nf_conntrack_netbios_ns: NetBIOS (samba) client support | ||
# nf_conntrack_pptp, nf_nat_pptp: PPTP over stateful firewall/NAT | ||
# nf_conntrack_ftp, nf_nat_ftp: active FTP support | ||
# nf_conntrack_tftp, nf_nat_tftp: TFTP support (server side) | ||
IPT_MODULES="{{ ufw_ipt_modules | default('nf_conntrack_ftp nf_nat_ftp nf_conntrack_netbios_ns') }}" | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Right now, every variable that can be defined, is in the vars or defaults files. This one is not, instead there's a default used. Would you mind setting There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Ok, no probs, I wanted to hide some really rare used variables from user, but I can add all variables in defaults file if this is the "policy". Do I need to add them into README as well? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add the default value
/etc/ufw/sysctl.conf
as a comment here so one knows what the os-default is?