|
12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152 |
- # == State: firewalld.ipsets
- #
- # This state ensures that /etc/firewalld/ipsets/ exists.
- #
- {% from "firewalld/map.jinja" import firewalld with context %}
-
- {%- if salt['pillar.get']('firewalld:ipset') %}
- package_ipset:
- pkg.installed:
- - name: {{ firewalld.ipsetpackage }}
-
- directory_firewalld_ipsets:
- file.directory: # make sure this is a directory
- - name: /etc/firewalld/ipsets
- - user: root
- - group: root
- - mode: 750
- - require:
- - pkg: package_firewalld # make sure package is installed
- - require_in:
- - service: service_firewalld
- - watch_in:
- - cmd: reload_firewalld # reload firewalld config
-
- # == Define: firewalld.ipsets
- #
- # This defines a ipset configuration, see firewalld.ipset (5) man page.
- #
- {% for k, v in salt['pillar.get']('firewalld:ipsets', {}).items() %}
- {% set z_name = v.name|default(k) %}
-
- /etc/firewalld/ipsets/{{ z_name }}.xml:
- file.managed:
- - name: /etc/firewalld/ipsets/{{ z_name }}.xml
- - user: root
- - group: root
- - mode: 644
- - source: salt://firewalld/files/ipset.xml
- - template: jinja
- - require:
- - pkg: package_firewalld # make sure package is installed
- - file: directory_firewalld_ipsets
- - require_in:
- - service: service_firewalld
- - watch_in:
- - cmd: reload_firewalld # reload firewalld config
- - context:
- name: {{ z_name }}
- ipset: {{ v }}
-
- {% endfor %}
- {%- endif %}
|