Skip to content

Commit 562273a

Browse files
author
Pavel Pulec
committed
do not use variable name with capitals + comment out empty if (future parser compatibility)
Signed-off-by: Pavel Pulec <[email protected]>
1 parent e80eff8 commit 562273a

File tree

2 files changed

+16
-16
lines changed

2 files changed

+16
-16
lines changed

manifests/server.pp

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
$ips = false, # an optional list of ip's for each in hosts[]
3030
$clients = [] # list of allowed client ip's # TODO: get from exported resources
3131
) {
32-
$FW = '$FW' # make using $FW in shorewall easier
32+
$fw = '$fw' # make using $fw in shorewall easier
3333

3434
include gluster::vardir
3535
include gluster::params
@@ -145,8 +145,8 @@
145145
}
146146
}
147147

148-
if $shorewall {
149-
# XXX: WIP
148+
# XXX: WIP
149+
#if $shorewall {
150150
#if type3x($ips) == 'array' {
151151
# #$other_host_ips = inline_template("<%= ips.delete_if {|x| x == '${ipaddress}' }.join(',') %>") # list of ips except myself
152152
# $source_ips = inline_template("<%= (ips+clients).uniq.delete_if {|x| x.empty? }.join(',') %>")
@@ -161,18 +161,18 @@
161161
#$nfs_endport = inline_template('<%= 38465+hosts.count %>')
162162
#shorewall::rule { 'gluster-24000':
163163
# rule => "
164-
# ACCEPT ${src} $FW tcp 24009:${endport}
164+
# ACCEPT ${src} $fw tcp 24009:${endport}
165165
# ",
166166
# comment => 'Allow 24000s for gluster',
167167
# before => Service["${::gluster::params::service_glusterd}"],
168168
#}
169169

170170
#if $nfs { # FIXME: TODO
171171
# shorewall::rule { 'gluster-nfs': rule => "
172-
# ACCEPT $(src} $FW tcp 38465:${nfs_endport}
172+
# ACCEPT $(src} $fw tcp 38465:${nfs_endport}
173173
# ", comment => 'Allow nfs for gluster'}
174174
#}
175-
}
175+
#}
176176

177177
# start service only after the firewall is opened and hosts are defined
178178
service { "${::gluster::params::service_glusterd}":

vagrant/puppet/manifests/site.pp

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@
141141

142142
class firewall {
143143

144-
$FW = '$FW' # make using $FW in shorewall easier
144+
$fw = '$fw' # make using $fw in shorewall easier
145145

146146
class { '::shorewall::configuration':
147147
# NOTE: no configuration specifics are needed at the moment
@@ -174,30 +174,30 @@
174174
}
175175

176176
# TODO: is this policy really what we want ? can we try to limit this ?
177-
shorewall::policy { '$FW-net':
177+
shorewall::policy { '$fw-net':
178178
policy => 'ACCEPT', # TODO: shouldn't we whitelist?
179179
}
180180

181-
shorewall::policy { '$FW-man':
181+
shorewall::policy { '$fw-man':
182182
policy => 'ACCEPT', # TODO: shouldn't we whitelist?
183183
}
184184

185185
####################################################################
186186
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
187187
# PORT PORT(S) DEST
188188
shorewall::rule { 'ssh': rule => "
189-
SSH/ACCEPT net $FW
190-
SSH/ACCEPT man $FW
189+
SSH/ACCEPT net $fw
190+
SSH/ACCEPT man $fw
191191
", comment => 'Allow SSH'}
192192

193193
shorewall::rule { 'ping': rule => "
194-
#Ping/DROP net $FW
195-
Ping/ACCEPT net $FW
196-
Ping/ACCEPT man $FW
194+
#Ping/DROP net $fw
195+
Ping/ACCEPT net $fw
196+
Ping/ACCEPT man $fw
197197
", comment => 'Allow ping from the `bad` net zone'}
198198

199199
shorewall::rule { 'icmp': rule => "
200-
ACCEPT $FW net icmp
201-
ACCEPT $FW man icmp
200+
ACCEPT $fw net icmp
201+
ACCEPT $fw man icmp
202202
", comment => 'Allow icmp from the firewall zone'}
203203
}

0 commit comments

Comments
 (0)