File tree Expand file tree Collapse file tree 2 files changed +15
-14
lines changed Expand file tree Collapse file tree 2 files changed +15
-14
lines changed Original file line number Diff line number Diff line change 2929 $ips = false , # an optional list of ip' s for each in hosts[]
3030 $clients = [] # list of allowed client ip' s # TODO: get from exported resources
3131) {
32- $FW = ' $FW' # make using $FW in shorewall easier
32+ # XXX: WIP
33+ # $FW = '$FW' # make using $FW in shorewall easier
3334
3435 include gluster::vardir
3536 include gluster::params
145146 }
146147 }
147148
148- if $shorewall {
149- # XXX: WIP
149+ # XXX: WIP
150+ # if $shorewall {
150151 # if type3x($ips) == 'array' {
151152 # #$other_host_ips = inline_template("<%= ips.delete_if {|x| x == '${ipaddress}' }.join(',') %>") # list of ips except myself
152153 # $source_ips = inline_template("<%= (ips+clients).uniq.delete_if {|x| x.empty? }.join(',') %>")
172173 # ACCEPT $(src} $FW tcp 38465:${nfs_endport}
173174 # ", comment => 'Allow nfs for gluster'}
174175 # }
175- }
176+ # }
176177
177178 # start service only after the firewall is opened and hosts are defined
178179 service { "${::gluster::params::service_glusterd}" :
Original file line number Diff line number Diff line change 141141
142142class firewall {
143143
144- $FW = ' $FW ' # make using $FW in shorewall easier
144+ $fw = ' $fw ' # make using $fw in shorewall easier
145145
146146 class { '::shorewall::configuration' :
147147 # NOTE: no configuration specifics are needed at the moment
174174 }
175175
176176 # TODO: is this policy really what we want ? can we try to limit this ?
177- shorewall::policy { '$FW -net' :
177+ shorewall::policy { '$fw -net' :
178178 policy => ' ACCEPT' , # TODO: shouldn't we whitelist?
179179 }
180180
181- shorewall::policy { '$FW -man' :
181+ shorewall::policy { '$fw -man' :
182182 policy => ' ACCEPT' , # TODO: shouldn't we whitelist?
183183 }
184184
185185 # ###################################################################
186186 # ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
187187 # PORT PORT(S) DEST
188188 shorewall::rule { 'ssh' : rule => "
189- SSH/ACCEPT net $FW
190- SSH/ACCEPT man $FW
189+ SSH/ACCEPT net $fw
190+ SSH/ACCEPT man $fw
191191 " , comment => ' Allow SSH' }
192192
193193 shorewall::rule { 'ping' : rule => "
194- #Ping/DROP net $FW
195- Ping/ACCEPT net $FW
196- Ping/ACCEPT man $FW
194+ #Ping/DROP net $fw
195+ Ping/ACCEPT net $fw
196+ Ping/ACCEPT man $fw
197197 " , comment => ' Allow ping from the `bad` net zone' }
198198
199199 shorewall::rule { 'icmp' : rule => "
200- ACCEPT $FW net icmp
201- ACCEPT $FW man icmp
200+ ACCEPT $fw net icmp
201+ ACCEPT $fw man icmp
202202 " , comment => ' Allow icmp from the firewall zone' }
203203}
You can’t perform that action at this time.
0 commit comments