diff options
author | Silvio Rhatto <rhatto@riseup.net> | 2015-09-11 21:56:50 -0300 |
---|---|---|
committer | Silvio Rhatto <rhatto@riseup.net> | 2015-09-11 21:56:50 -0300 |
commit | 14ced49d32beab8b80c6499b3a02ed1523ab98ae (patch) | |
tree | 22cdf03d732e91e502c5124e9f649d1c972488ce /manifests/virtual/puppetmaster.pp | |
parent | 279c52185ec96cd1f8b0c25a1a14b0e537c1c11a (diff) | |
download | puppet-firewall-14ced49d32beab8b80c6499b3a02ed1523ab98ae.tar.gz puppet-firewall-14ced49d32beab8b80c6499b3a02ed1523ab98ae.tar.bz2 |
Use firewall::virtual class names
Diffstat (limited to 'manifests/virtual/puppetmaster.pp')
-rw-r--r-- | manifests/virtual/puppetmaster.pp | 85 |
1 files changed, 85 insertions, 0 deletions
diff --git a/manifests/virtual/puppetmaster.pp b/manifests/virtual/puppetmaster.pp new file mode 100644 index 0000000..e54c166 --- /dev/null +++ b/manifests/virtual/puppetmaster.pp @@ -0,0 +1,85 @@ +class firewall::virtual::puppetmaster($destination, $puppetmaster_port = '8140', $puppetmaster_nonssl_port = '8141', $zone = 'fw') { + shorewall::rule { 'puppetmaster-1': + action => 'DNAT', + source => 'net', + destination => "$zone:$destination:$puppetmaster_port", + proto => 'tcp', + destinationport => "$puppetmaster_port", + ratelimit => hiera("firewall::ssl_ratelimit", '-'), + order => 700, + } + + shorewall::rule { 'puppetmaster-2': + action => 'DNAT', + source => 'net', + destination => "$zone:$destination:$puppetmaster_port", + proto => 'udp', + destinationport => "$puppetmaster_port", + ratelimit => hiera("firewall::ssl_ratelimit", '-'), + order => 701, + } + + shorewall::rule { 'puppetmaster-3': + action => 'DNAT', + source => '$FW', + destination => "$zone:$destination:$puppetmaster_port", + proto => 'tcp', + destinationport => "$puppetmaster_port", + originaldest => hiera('firewall::external_ip', $::ipaddress), + ratelimit => hiera("firewall::ssl_ratelimit", '-'), + order => 702, + } + + shorewall::rule { 'puppetmaster-4': + action => 'DNAT', + source => '$FW', + destination => "$zone:$destination:$puppetmaster_port", + proto => 'udp', + destinationport => "$puppetmaster_port", + originaldest => hiera('firewall::external_ip', $::ipaddress), + ratelimit => hiera("firewall::ssl_ratelimit", '-'), + order => 703, + } + + shorewall::rule { 'puppetmaster-5': + action => 'DNAT', + source => 'net', + destination => "$zone:$destination:$puppetmaster_nonssl_port", + proto => 'tcp', + destinationport => "$puppetmaster_nonssl_port", + ratelimit => '-', + order => 704, + } + + shorewall::rule { 'puppetmaster-6': + action => 'DNAT', + source => 'net', + destination => "$zone:$destination:$puppetmaster_nonssl_port", + proto => 'udp', + destinationport => "$puppetmaster_nonssl_port", + ratelimit => '-', + order => 705, + } + + shorewall::rule { 'puppetmaster-7': + action => 'DNAT', + source => '$FW', + destination => "$zone:$destination:$puppetmaster_nonssl_port", + proto => 'tcp', + destinationport => "$puppetmaster_nonssl_port", + originaldest => hiera('firewall::external_ip', $::ipaddress), + ratelimit => '-', + order => 706, + } + + shorewall::rule { 'puppetmaster-8': + action => 'DNAT', + source => '$FW', + destination => "$zone:$destination:$puppetmaster_nonssl_port", + proto => 'udp', + destinationport => "$puppetmaster_nonssl_port", + originaldest => hiera('firewall::external_ip', $::ipaddress), + ratelimit => '-', + order => 707, + } +} |