File tree Expand file tree Collapse file tree 2 files changed +16
-16
lines changed Expand file tree Collapse file tree 2 files changed +16
-16
lines changed Original file line number Diff line number Diff line change 2929 $ips = false , # an optional list of ip' s for each in hosts[]
3030 $clients = [] # list of allowed client ip' s # TODO: get from exported resources
3131) {
32- $FW = ' $FW ' # make using $FW in shorewall easier
32+ $fw = ' $fw ' # make using $fw in shorewall easier
3333
3434 include gluster::vardir
3535 include gluster::params
145145 }
146146 }
147147
148- if $shorewall {
149- # XXX: WIP
148+ # XXX: WIP
149+ # if $shorewall {
150150 # if type3x($ips) == 'array' {
151151 # #$other_host_ips = inline_template("<%= ips.delete_if {|x| x == '${ipaddress}' }.join(',') %>") # list of ips except myself
152152 # $source_ips = inline_template("<%= (ips+clients).uniq.delete_if {|x| x.empty? }.join(',') %>")
161161 # $nfs_endport = inline_template('<%= 38465+hosts.count %>')
162162 #shorewall::rule { 'gluster-24000' :
163163 # rule => "
164- # ACCEPT ${src} $FW tcp 24009:${endport}
164+ # ACCEPT ${src} $fw tcp 24009:${endport}
165165 # ",
166166 # comment => 'Allow 24000s for gluster',
167167 # before => Service["${::gluster::params::service_glusterd}"],
168168 # }
169169
170170 # if $nfs { # FIXME: TODO
171171 # shorewall::rule { 'gluster-nfs': rule => "
172- # ACCEPT $(src} $FW tcp 38465:${nfs_endport}
172+ # ACCEPT $(src} $fw tcp 38465:${nfs_endport}
173173 # ", comment => 'Allow nfs for gluster'}
174174 # }
175- }
175+ # }
176176
177177 # start service only after the firewall is opened and hosts are defined
178178 service { "${::gluster::params::service_glusterd}" :
Original file line number Diff line number Diff line change 141141
142142class firewall {
143143
144- $FW = ' $FW ' # make using $FW in shorewall easier
144+ $fw = ' $fw ' # make using $fw in shorewall easier
145145
146146 class { '::shorewall::configuration' :
147147 # NOTE: no configuration specifics are needed at the moment
174174 }
175175
176176 # TODO: is this policy really what we want ? can we try to limit this ?
177- shorewall::policy { '$FW -net' :
177+ shorewall::policy { '$fw -net' :
178178 policy => ' ACCEPT' , # TODO: shouldn't we whitelist?
179179 }
180180
181- shorewall::policy { '$FW -man' :
181+ shorewall::policy { '$fw -man' :
182182 policy => ' ACCEPT' , # TODO: shouldn't we whitelist?
183183 }
184184
185185 # ###################################################################
186186 # ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
187187 # PORT PORT(S) DEST
188188 shorewall::rule { 'ssh' : rule => "
189- SSH/ACCEPT net $FW
190- SSH/ACCEPT man $FW
189+ SSH/ACCEPT net $fw
190+ SSH/ACCEPT man $fw
191191 " , comment => ' Allow SSH' }
192192
193193 shorewall::rule { 'ping' : rule => "
194- #Ping/DROP net $FW
195- Ping/ACCEPT net $FW
196- Ping/ACCEPT man $FW
194+ #Ping/DROP net $fw
195+ Ping/ACCEPT net $fw
196+ Ping/ACCEPT man $fw
197197 " , comment => ' Allow ping from the `bad` net zone' }
198198
199199 shorewall::rule { 'icmp' : rule => "
200- ACCEPT $FW net icmp
201- ACCEPT $FW man icmp
200+ ACCEPT $fw net icmp
201+ ACCEPT $fw man icmp
202202 " , comment => ' Allow icmp from the firewall zone' }
203203}
You can’t perform that action at this time.
0 commit comments