Skip to content
Extraits de code Groupes Projets
Valider c0979593 rédigé par Théo - Le Filament's avatar Théo - Le Filament
Parcourir les fichiers

feat: allow multiple SSH input ports

parent ce74b227
Aucune branche associée trouvée
Aucune étiquette associée trouvée
Aucune requête de fusion associée trouvée
...@@ -4,24 +4,28 @@ ...@@ -4,24 +4,28 @@
ansible.builtin.service: ansible.builtin.service:
name: netfilter-persistent name: netfilter-persistent
state: restarted state: restarted
when: not ansible_check_mode
- name: "restart fail2ban" - name: "restart fail2ban"
ansible.builtin.service: ansible.builtin.service:
name: fail2ban name: fail2ban
state: restarted state: restarted
when: not ansible_check_mode
- name: "restart docker" - name: "restart docker"
ansible.builtin.service: ansible.builtin.service:
name: docker name: docker
state: restarted state: restarted
when: inventory_hostname in groups.docker when: not ansible_check_mode and inventory_hostname in groups.docker
- name: "restart auditd" - name: "restart auditd"
ansible.builtin.service: ansible.builtin.service:
name: auditd name: auditd
state: restarted state: restarted
when: not ansible_check_mode
- name: "restart rsyslog" - name: "restart rsyslog"
ansible.builtin.service: ansible.builtin.service:
name: rsyslog name: rsyslog
state: restarted state: restarted
when: not ansible_check_mode
...@@ -28,18 +28,21 @@ ...@@ -28,18 +28,21 @@
name: "fail2ban" name: "fail2ban"
enabled: true enabled: true
state: started state: started
when: not ansible_check_mode
- name: "Make sure netfilter-persistent is enabled" - name: "Make sure netfilter-persistent is enabled"
ansible.builtin.service: ansible.builtin.service:
name: "netfilter-persistent" name: "netfilter-persistent"
enabled: true enabled: true
state: started state: started
when: not ansible_check_mode
- name: "Make sure auditd is enabled" - name: "Make sure auditd is enabled"
ansible.builtin.service: ansible.builtin.service:
name: "auditd" name: "auditd"
enabled: true enabled: true
state: started state: started
when: not ansible_check_mode
- name: "Push specific fail2ban jail configuration file" - name: "Push specific fail2ban jail configuration file"
tags: tags:
...@@ -85,6 +88,10 @@ ...@@ -85,6 +88,10 @@
- "restart fail2ban" - "restart fail2ban"
- name: "Create iptables configuration" - name: "Create iptables configuration"
vars:
template_sshd_ports:
- "{{ default_sshd_port }}"
- "{{ force_sshd_port | default(None) }}"
ansible.builtin.template: ansible.builtin.template:
src: "iptables.conf.j2" src: "iptables.conf.j2"
dest: "/etc/iptables/rules.v4" dest: "/etc/iptables/rules.v4"
...@@ -97,6 +104,10 @@ ...@@ -97,6 +104,10 @@
- "restart docker" - "restart docker"
- name: "Create ip6tables configuration" - name: "Create ip6tables configuration"
vars:
template_sshd_ports:
- "{{ default_sshd_port }}"
- "{{ force_sshd_port | default(None) }}"
ansible.builtin.template: ansible.builtin.template:
src: "ip6tables.conf.j2" src: "ip6tables.conf.j2"
dest: "/etc/iptables/rules.v6" dest: "/etc/iptables/rules.v6"
......
...@@ -14,7 +14,11 @@ ...@@ -14,7 +14,11 @@
# Autoriser le DHCPv6 sur le lien local uniquement # Autoriser le DHCPv6 sur le lien local uniquement
-A INPUT -m state --state NEW -m udp -p udp -s fe80::/10 --dport 546 -j ACCEPT -A INPUT -m state --state NEW -m udp -p udp -s fe80::/10 --dport 546 -j ACCEPT
# SSH # SSH
-A INPUT -p tcp -m tcp --dport {{ default_sshd_port }} -j ACCEPT {% for port in template_sshd_ports | default([2222]) %}
{% if port %}
-A INPUT -p tcp -m tcp --dport {{ port }} -j ACCEPT
{% endif %}
{% endfor %}
{% if inventory_hostname in groups.gitlab | default([]) %} {% if inventory_hostname in groups.gitlab | default([]) %}
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
# REGISTRY # REGISTRY
......
...@@ -26,7 +26,11 @@ ...@@ -26,7 +26,11 @@
-A INPUT -p icmp --icmp-type echo-reply -j ACCEPT -A INPUT -p icmp --icmp-type echo-reply -j ACCEPT
{% endif %} {% endif %}
# SSH # SSH
-A INPUT -p tcp -m tcp --dport {{ default_sshd_port }} -j ACCEPT {% for port in template_sshd_ports | default([2222]) %}
{% if port %}
-A INPUT -p tcp -m tcp --dport {{ port }} -j ACCEPT
{% endif %}
{% endfor %}
{% if inventory_hostname in groups.gitlab | default([]) %} {% if inventory_hostname in groups.gitlab | default([]) %}
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
# REGISTRY # REGISTRY
......
0% Chargement en cours ou .
You are about to add 0 people to the discussion. Proceed with caution.
Veuillez vous inscrire ou vous pour commenter