From c61100f67ab6d95c0b33a72cf0533e2547479cdd Mon Sep 17 00:00:00 2001 From: khaledk2 Date: Tue, 17 Dec 2024 14:17:47 +0000 Subject: [PATCH] debug --- ansible/idr-firewall.yml | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/ansible/idr-firewall.yml b/ansible/idr-firewall.yml index fd980673..1651f54f 100644 --- a/ansible/idr-firewall.yml +++ b/ansible/idr-firewall.yml @@ -89,12 +89,14 @@ # allow TCP traffic on idr_external_tcp_ports - 'rule family="ipv4" protocol value="tcp" destination port={{ idr_external_tcp_ports | join("," ) }} accept' - - name: Run command + - name: Run command 1 become: true - ansible.builtin.command : - - firewall-cmd --permanent --direct --add-rule ipv4 filter OUTPUT 0 -p tcp -s 192.0.0.0/8 --dport 80 -j ACCEPT - - firewall-cmd --permanent --direct --add-rule ipv4 filter OUTPUT 0 -p tcp -s 192.0.0.0/8 -j ACCEPT - - + ansible.builtin.command: firewall-cmd --permanent --direct --add-rule ipv4 filter OUTPUT 0 -p tcp -s 192.0.0.0/8 --dport 80 -j ACCEPT + + - name: Run command 2 + become: true + ansible.builtin.command: firewall-cmd --permanent --direct --add-rule ipv4 filter OUTPUT 0 -p tcp -s 192.0.0.0/8 -j ACCEPT + # Use a low priority REJECT rule so that clients can detect when # they've been rejected # The alternative of setting a default DROP policy will leave them