This role lets your pass services and/or ports via zones with interfaces or sources.
Name | Required | Example | Description |
---|---|---|---|
service |
no | home-assistant |
Service to enable. If port is also defined, the service is created with the specified port. Therefore if you use built-in services, omit port , otherwise specify it. |
port |
no | 8080/tcp |
Port number and protocol to open. |
zone |
no | dmz |
Zone to apply the changes to. If not specified, changes are applied to the default zone (public usually). A zone must have either a source or an interface . |
source |
no | 99.99.99.99 |
IP address to add to the zone. |
interface |
no | eth0 |
Interface to add to the zone. |
fw_target |
no | ACCEPT |
firewalld target to set for the specified zone . Normally shouldn't be required. |
k8s_node |
no | false |
If true , configuration is completely skipped and firewalld is disabled. This can be useful if you configure several hosts and some of them are K8s nodes, where a firewall shouldn't be present in most cases. Therefore this is normally set on a host/group level. |
rate_limit |
no | 10/m |
If set, the service will be enabled with the specified rate limit. |
family |
no | ipv6 |
If set, the rule will be limited to the specified address family. Only applied if rate_limit is also set, otherwise ignored. Possible values are ipv4 , ipv6 . |
enabled |
no | false |
If false , the specified service is disabled, instead of enabled. Defaults to true . |
- include_role:
name: noobient.firewalld
vars:
service: https
- include_role:
name: noobient.firewalld
vars:
service: sshsec
port: 922/tcp
- include_role:
name: noobient.firewalld
vars:
zone: wireguard
interface: wg0
fw_target: ACCEPT
rate_limit: 100/m
family: ipv6
enabled: false
N/A
Platform | Support | Status |
---|---|---|
Linter | ✅ | |
AlmaLinux 8 | ✅ | |
AlmaLinux 9 | ✅ | |
Fedora 40 | ✅ | |
Fedora 41 | ✅ | |
Ubuntu 20.04 | ✅ | |
Ubuntu 22.04 | ✅ | |
Ubuntu 24.04 | ✅ |