summaryrefslogtreecommitdiffstats
path: root/roles/common
diff options
context:
space:
mode:
authorGuilhem Moulin <guilhem@fripost.org>2020-05-16 02:53:06 +0200
committerGuilhem Moulin <guilhem@fripost.org>2020-05-16 05:46:03 +0200
commit585258e79d8c5a640905c1f05344ca52f614b112 (patch)
tree7a51497cdc34c1acff9ecbc63a4fb3b9fc75ddf2 /roles/common
parentbac7811d2b35252b7a83a45d75bb344b4b1776a9 (diff)
typofix
Diffstat (limited to 'roles/common')
-rwxr-xr-xroles/common/templates/etc/nftables.conf.j24
1 files changed, 2 insertions, 2 deletions
diff --git a/roles/common/templates/etc/nftables.conf.j2 b/roles/common/templates/etc/nftables.conf.j2
index 3d2a23d..3104a4a 100755
--- a/roles/common/templates/etc/nftables.conf.j2
+++ b/roles/common/templates/etc/nftables.conf.j2
@@ -62,7 +62,7 @@ table inet filter {
# https://blog.fraggod.net/2016/09/25/nftables-re-injected-ipsec-matching-without-xt_policy.html
define IPsec.mark = 0x220
meta l4proto esp mark set mark | $IPsec.mark accept
- ip saddr 172.16.0.0/24 ip daddr 172.16.0.7 mark & $IPsec.mark == $IPsec.mark accept
+ ip saddr 172.16.0.0/24 ip daddr {{ ipsec[inventory_hostname_short] }} mark & $IPsec.mark == $IPsec.mark accept
# rate-limiting is done directly by the kernel (net.ipv4.icmp_{ratelimit,ratemask} runtime options)
icmp type { echo-reply, echo-request, destination-unreachable } counter accept
@@ -108,7 +108,7 @@ table inet filter {
# because by the time we see a packet to 172.16.0.0/24 we don't
# know if it'll be encapsulated
meta l4proto esp accept
- ip saddr 172.16.0.7 ip daddr 172.16.0.0/24 accept
+ ip saddr {{ ipsec[inventory_hostname_short] }} ip daddr 172.16.0.0/24 accept
meta l4proto { icmp, icmpv6 } accept