windows_firewall_profile Resource
This page is generated from the Chef source code.To suggest a change, edit the windows_firewall_profile.rb file and submit a pull request to the Chef repository.
Use the windows_firewall_profile resource to enable, disable, and configure the Windows firewall.
New in Chef Infra Client 16.3.
Syntax
The full syntax for all of the properties that are available to the windows_firewall_profile resource is:
windows_firewall_profile 'name' do
allow_inbound_rules true, false, String
allow_local_firewall_rules true, false, String
allow_local_ipsec_rules true, false, String
allow_unicast_response true, false, String
allow_user_apps true, false, String
allow_user_ports true, false, String
default_inbound_action String
default_outbound_action String
display_notification true, false, String
profile String # default value: 'name' unless specified
action Symbol # defaults to :enable if not specified
end
where:
-
windows_firewall_profile
is the resource. -
name
is the name given to the resource block. -
action
identifies which steps Chef Infra Client will take to bring the node into the desired state. -
allow_inbound_rules
,allow_local_firewall_rules
,allow_local_ipsec_rules
,allow_unicast_response
,allow_user_apps
,allow_user_ports
,default_inbound_action
,default_outbound_action
,display_notification
, andprofile
are the properties available to this resource.
Actions
The windows_firewall_profile resource has the following actions:
:disable
- Disable a Windows Firewall profile
:enable
- Enable and optionally configure a Windows Firewall profile
:nothing
- This resource block does not act unless notified by another resource to take action. Once notified, this resource block either runs immediately or is queued up to run at the end of a Chef Infra Client run.
Properties
The windows_firewall_profile resource has the following properties:
allow_inbound_rules
-
Ruby Type: true, false, StringAllowed Values:
true, false, "NotConfigured"
Allow users to set inbound firewall rules
allow_local_firewall_rules
-
Ruby Type: true, false, StringAllowed Values:
true, false, "NotConfigured"
Merges inbound firewall rules into the policy
allow_local_ipsec_rules
-
Ruby Type: true, false, StringAllowed Values:
true, false, "NotConfigured"
Allow users to manage local connection security rules
allow_unicast_response
-
Ruby Type: true, false, StringAllowed Values:
true, false, "NotConfigured"
Allow unicast responses to multicast and broadcast messages
allow_user_apps
-
Ruby Type: true, false, StringAllowed Values:
true, false, "NotConfigured"
Allow user applications to manage firewall
allow_user_ports
-
Ruby Type: true, false, StringAllowed Values:
true, false, "NotConfigured"
Allow users to manage firewall port rules
default_inbound_action
-
Ruby Type: StringAllowed Values:
"Allow", "Block", "NotConfigured"
Set the default policy for inbound network traffic
default_outbound_action
-
Ruby Type: StringAllowed Values:
"Allow", "Block", "NotConfigured"
Set the default policy for outbound network traffic
display_notification
-
Ruby Type: true, false, StringAllowed Values:
true, false, "NotConfigured"
Display a notification when firewall blocks certain activity
profile
-
Ruby Type: String | Default Value:
The resource block's name
Allowed Values:"Domain", "Private", "Public"
Set the Windows Profile being configured
Common Resource Functionality
Chef resources include common properties, notifications, and resource guards.
Common Properties
The following properties are common to every resource:
compile_time
-
Ruby Type: true, false | Default Value:
false
Control the phase during which the resource is run on the node. Set to true to run while the resource collection is being built (the
compile phase
). Set to false to run while Chef Infra Client is configuring the node (theconverge phase
). ignore_failure
-
Ruby Type: true, false, :quiet | Default Value:
false
Continue running a recipe if a resource fails for any reason.
:quiet
will not display the full stack trace and the recipe will continue to run if a resource fails. retries
-
Ruby Type: Integer | Default Value:
0
The number of attempts to catch exceptions and retry the resource.
retry_delay
-
Ruby Type: Integer | Default Value:
2
The retry delay (in seconds).
sensitive
-
Ruby Type: true, false | Default Value:
false
Ensure that sensitive resource data is not logged by Chef InfraClient.
Notifications
notifies
-
Ruby Type: Symbol, 'Chef::Resource[String]'
A resource may notify another resource to take action when its state changes. Specify a
'resource[name]'
, the:action
that resource should take, and then the:timer
for that action. A resource may notify more than one resource; use anotifies
statement for each resource to be notified.If the referenced resource does not exist, an error is raised. In contrast,
subscribes
will not fail if the source resource is not found.
A timer specifies the point during a Chef Infra Client run at which a notification is run. The following timers are available:
:before
Specifies that the action on a notified resource should be run before processing the resource block in which the notification is located.
:delayed
Default. Specifies that a notification should be queued up, and then executed at the end of a Chef Infra Client run.
-
:immediate
,:immediately
Specifies that a notification should be run immediately, per resource notified.
The syntax for notifies
is:
notifies :action, 'resource[name]', :timer
subscribes
Ruby Type: Symbol, 'Chef::Resource[String]'
A resource may listen to another resource, and then take action if the state of the resource being listened to changes. Specify a 'resource[name]'
, the :action
to be taken, and then the :timer
for that action.
Note that subscribes
does not apply the specified action to the resource that it listens to - for example:
file '/etc/nginx/ssl/example.crt' do
mode '0600'
owner 'root'
end
service 'nginx' do
subscribes :reload, 'file[/etc/nginx/ssl/example.crt]', :immediately
end
In this case the subscribes
property reloads the nginx
service whenever its certificate file, located under /etc/nginx/ssl/example.crt
, is updated. subscribes
does not make any changes to the certificate file itself, it merely listens for a change to the file, and executes the :reload
action for its resource (in this example nginx
) when a change is detected.
If the other resource does not exist, the subscription will not raise an error. Contrast this with the stricter semantics of notifies
, which will raise an error if the other resource does not exist.
A timer specifies the point during a Chef Infra Client run at which a notification is run. The following timers are available:
:before
Specifies that the action on a notified resource should be run before processing the resource block in which the notification is located.
:delayed
Default. Specifies that a notification should be queued up, and then executed at the end of a Chef Infra Client run.
-
:immediate
,:immediately
Specifies that a notification should be run immediately, per resource notified.
The syntax for subscribes
is:
subscribes :action, 'resource[name]', :timer
Guards
A guard property can be used to evaluate the state of a node during the execution phase of a Chef Infra Client run. Based on the results of this evaluation, a guard property is then used to tell Chef Infra Client if it should continue executing a resource. A guard property accepts either a string value or a Ruby block value:
- A string is executed as a shell command. If the command returns
0
, the guard is applied. If the command returns any other value, then the guard property is not applied. String guards in a powershell_script run Windows PowerShell commands and may returntrue
in addition to0
. - A block is executed as Ruby code that must return either
true
orfalse
. If the block returnstrue
, the guard property is applied. If the block returnsfalse
, the guard property is not applied.
A guard property is useful for ensuring that a resource is idempotent by allowing that resource to test for the desired state as it is being executed, and then if the desired state is present, for Chef Infra Client to do nothing.
PropertiesThe following properties can be used to define a guard that is evaluated during the execution phase of a Chef Infra Client run:
not_if
Prevent a resource from executing when the condition returns
true
.only_if
Allow a resource to execute only if the condition returns
true
.
Examples
The following examples demonstrate various approaches for using the windows_firewall_profile resource in recipes:
Enable and Configure the Private Profile of the Windows Profile:
windows_firewall_profile 'Private' do
default_inbound_action 'Block'
default_outbound_action 'Allow'
allow_inbound_rules true
display_notification false
action :enable
end
Enable and Configure the Public Profile of the Windows Firewall:
windows_firewall_profile 'Public' do
default_inbound_action 'Block'
default_outbound_action 'Allow'
allow_inbound_rules false
display_notification false
action :enable
end
Disable the Domain Profile of the Windows Firewall:
windows_firewall_profile 'Disable the Domain Profile of the Windows Firewall' do
profile 'Domain'
action :disable
end
© Chef Software, Inc.
Licensed under the Creative Commons Attribution 3.0 Unported License.
The Chef™ Mark and Chef Logo are either registered trademarks/service marks or trademarks/servicemarks of Chef, in the United States and other countries and are used with Chef Inc's permission.
We are not affiliated with, endorsed or sponsored by Chef Inc.
https://docs.chef.io/resources/windows_firewall_profile/