Skip to content

Commit 2398be0

Browse files
author
Pavel Pulec
committed
do not use variable name with capitals + comment out empty if (future parser compatibility)
Signed-off-by: Pavel Pulec <[email protected]>
1 parent e80eff8 commit 2398be0

File tree

2 files changed

+15
-14
lines changed

2 files changed

+15
-14
lines changed

manifests/server.pp

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@
2929
$ips = false, # an optional list of ip's for each in hosts[]
3030
$clients = [] # list of allowed client ip's # TODO: get from exported resources
3131
) {
32-
$FW = '$FW' # make using $FW in shorewall easier
32+
# XXX: WIP
33+
# $FW = '$FW' # make using $FW in shorewall easier
3334

3435
include gluster::vardir
3536
include gluster::params
@@ -145,8 +146,8 @@
145146
}
146147
}
147148

148-
if $shorewall {
149-
# XXX: WIP
149+
# XXX: WIP
150+
#if $shorewall {
150151
#if type3x($ips) == 'array' {
151152
# #$other_host_ips = inline_template("<%= ips.delete_if {|x| x == '${ipaddress}' }.join(',') %>") # list of ips except myself
152153
# $source_ips = inline_template("<%= (ips+clients).uniq.delete_if {|x| x.empty? }.join(',') %>")
@@ -172,7 +173,7 @@
172173
# ACCEPT $(src} $FW tcp 38465:${nfs_endport}
173174
# ", comment => 'Allow nfs for gluster'}
174175
#}
175-
}
176+
#}
176177

177178
# start service only after the firewall is opened and hosts are defined
178179
service { "${::gluster::params::service_glusterd}":

vagrant/puppet/manifests/site.pp

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@
141141

142142
class firewall {
143143

144-
$FW = '$FW' # make using $FW in shorewall easier
144+
$fw = '$fw' # make using $fw in shorewall easier
145145

146146
class { '::shorewall::configuration':
147147
# NOTE: no configuration specifics are needed at the moment
@@ -174,30 +174,30 @@
174174
}
175175

176176
# TODO: is this policy really what we want ? can we try to limit this ?
177-
shorewall::policy { '$FW-net':
177+
shorewall::policy { '$fw-net':
178178
policy => 'ACCEPT', # TODO: shouldn't we whitelist?
179179
}
180180

181-
shorewall::policy { '$FW-man':
181+
shorewall::policy { '$fw-man':
182182
policy => 'ACCEPT', # TODO: shouldn't we whitelist?
183183
}
184184

185185
####################################################################
186186
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
187187
# PORT PORT(S) DEST
188188
shorewall::rule { 'ssh': rule => "
189-
SSH/ACCEPT net $FW
190-
SSH/ACCEPT man $FW
189+
SSH/ACCEPT net $fw
190+
SSH/ACCEPT man $fw
191191
", comment => 'Allow SSH'}
192192

193193
shorewall::rule { 'ping': rule => "
194-
#Ping/DROP net $FW
195-
Ping/ACCEPT net $FW
196-
Ping/ACCEPT man $FW
194+
#Ping/DROP net $fw
195+
Ping/ACCEPT net $fw
196+
Ping/ACCEPT man $fw
197197
", comment => 'Allow ping from the `bad` net zone'}
198198

199199
shorewall::rule { 'icmp': rule => "
200-
ACCEPT $FW net icmp
201-
ACCEPT $FW man icmp
200+
ACCEPT $fw net icmp
201+
ACCEPT $fw man icmp
202202
", comment => 'Allow icmp from the firewall zone'}
203203
}

0 commit comments

Comments
 (0)