-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
#125: Allow HTTP and HTTPS in lemmy.yml #203
Conversation
Tested. Works. |
You don't really need that |
@@ -98,6 +98,15 @@ | |||
- "virtualenv" | |||
- "python3-setuptools" | |||
|
|||
- name: Allow HTTP and HTTPS in ufw | |||
when: (ansible_distribution == 'Debian') or (ansible_distribution == 'Ubuntu') |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As noted above, this isn't necessary as it's covered earlier in the playbook: https://github.com/LemmyNet/lemmy-ansible/blob/b6cb0ca9bb912723db9893408bd91299eeb29792/lemmy.yml#L72-L76C34
Would you mind updating the https://github.com/LemmyNet/lemmy-ansible/blob/main/requirements.yml I'm not as savvy with Debian/Ubuntu as I am with RHEL--does |
Actually, I tested this out and it doesn't seem to work:
I had to change
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See comments above.
I just double checked, and it is not present on minimal installs. It looks like the |
Maybe managing firewall rules should be outside the scope of lemmy-ansible unless we have a generic way to handle it. Depending on how you setup your systems and especially if you want to run it locally (which others have expressed interest in), modifying firewall rules exposes those people to possible attacks.
|
The point of the playbooks is to get a Lemmy instance up from scratch. It should to be as frictionless as possible as most users will not be seasoned systems administrators. It's reasonable to assume that if you're running two of the stock firewalls of the supported distributions, the necessary ports for the software to run would be opened. If I run a playbook that's installing a complete software stack with the assumption at the end I'll have a functioning piece of software, and it doesn't work--whether it be they can't reach their instance or that certbot fails out ungracefully, it leaves a lot to be desired. That is a bad user experience. So, I'll have to disagree with your assumption in the context of this project. Punching http/https into IIt should be documented, though. Having a default variable that turns off punching seems reasonable to me. A middle ground could be punching on the initial installation if 80,443 aren't open already to ensure the application and certbot will run on the initial install.
What? I am not following this example, but I'll play along for kicks. Have you witnessed this in the wild or speculating? EDIT I have some free time today. Let me make a PoC and see if you think it's a reasonable approach that would satiate both your thoughts and mine. |
What are your thoughts on something simple like this? Another option is to use Ultimately, I feel that most users using the playbooks to prop up an instance are looking for a seamless experience. I'd like to offer the ability for the playbook to go from nothing to a fully configured Lemmy install without additional intervention. If you strongly feel this is a mistake, as long as we make it abundantly clear in the documentation that you'll want to ensure the proper ports are open prior to running the playbooks, we'll be okay. @dessalines @Nutomic, if either of you have an opinion on this, please chime in. |
I think opening firewall ports should definitely be included in the playbook, because the firewall is enabled by default on some vps as mentioned in the issue. I dont think a prompt is great, because some users wont understand it, so its an unnecessary hurdle. It would make more sense to check if the ufw package is installed, and if thats the case open the ports. |
After thinking it over, I agree. Open the ports as part of the playbook. Should we be using iptables instead of ufw? |
If anyone wants to handle some of the firewall issues above, that can be done in a different PR. |
Fixes the issue #125 on Debian and Ubuntu, where letsencrypt thingie went nanners because the ports are closed.