aboutsummaryrefslogtreecommitdiff
path: root/manifests/subsystems/firewall
diff options
context:
space:
mode:
authorSilvio Rhatto <rhatto@riseup.net>2011-08-11 14:39:54 -0300
committerSilvio Rhatto <rhatto@riseup.net>2011-08-11 14:39:54 -0300
commit5a635784572610d8b155ce9d907bbbf3d245cf8d (patch)
treec7ebce906380748ec370fb58f6794b7805c916be /manifests/subsystems/firewall
parent7f7d3cab9c4b4fc1bdc3827e8ea4c680c73da48d (diff)
downloadpuppet-nodo-5a635784572610d8b155ce9d907bbbf3d245cf8d.tar.gz
puppet-nodo-5a635784572610d8b155ce9d907bbbf3d245cf8d.tar.bz2
Changing default zone for firewall::router rules
Diffstat (limited to 'manifests/subsystems/firewall')
-rw-r--r--manifests/subsystems/firewall/router.pp18
1 files changed, 9 insertions, 9 deletions
diff --git a/manifests/subsystems/firewall/router.pp b/manifests/subsystems/firewall/router.pp
index 4a01403..9384849 100644
--- a/manifests/subsystems/firewall/router.pp
+++ b/manifests/subsystems/firewall/router.pp
@@ -1,4 +1,4 @@
-class firewall::router::http($destination, $zone = 'vm') {
+class firewall::router::http($destination, $zone = 'loc') {
shorewall::rule { 'http-route':
action => 'DNAT',
source => 'all',
@@ -10,7 +10,7 @@ class firewall::router::http($destination, $zone = 'vm') {
}
}
-class firewall::router::https($destination, $zone = 'vm') {
+class firewall::router::https($destination, $zone = 'loc') {
shorewall::rule { 'https-route':
action => 'DNAT',
source => 'all',
@@ -22,7 +22,7 @@ class firewall::router::https($destination, $zone = 'vm') {
}
}
-class firewall::router::puppetmaster($destination, $puppetmaster_port = '8140', $puppetmaster_nonssl_port = '8141', $zone = 'fw') {
+class firewall::router::puppetmaster($destination, $puppetmaster_port = '8140', $puppetmaster_nonssl_port = '8141', $zone = 'loc') {
shorewall::rule { 'puppetmaster-1':
action => 'DNAT',
source => 'all',
@@ -64,7 +64,7 @@ class firewall::router::puppetmaster($destination, $puppetmaster_port = '8140',
}
}
-class firewall::router::gitd($destination, $zone = 'fw') {
+class firewall::router::gitd($destination, $zone = 'loc') {
shorewall::rule { 'git-daemon':
action => 'DNAT',
source => 'net',
@@ -76,7 +76,7 @@ class firewall::router::gitd($destination, $zone = 'fw') {
}
}
-class firewall::router::icecast($destination, $zone = 'fw') {
+class firewall::router::icecast($destination, $zone = 'loc') {
shorewall::rule { 'icecast-1':
action => 'DNAT',
source => 'net',
@@ -99,7 +99,7 @@ class firewall::router::icecast($destination, $zone = 'fw') {
}
}
-class firewall::router::mail($destination, $zone = 'fw') {
+class firewall::router::mail($destination, $zone = 'loc') {
shorewall::rule { 'mail-1':
action => 'DNAT',
source => 'all',
@@ -121,7 +121,7 @@ class firewall::router::mail($destination, $zone = 'fw') {
}
}
-define firewall::router::ssh($destination, $port_orig = '22', $port_dest = '', $zone = 'vm') {
+define firewall::router::ssh($destination, $port_orig = '22', $port_dest = '', $zone = 'loc') {
shorewall::rule { "ssh-$name":
action => 'DNAT',
source => 'all',
@@ -136,7 +136,7 @@ define firewall::router::ssh($destination, $port_orig = '22', $port_dest = '', $
}
}
-define firewall::router::munin($destination, $port_orig, $port_dest = '', $zone = 'fw') {
+define firewall::router::munin($destination, $port_orig, $port_dest = '', $zone = 'loc') {
shorewall::rule { "munin-$name":
action => 'DNAT',
source => 'all',
@@ -151,7 +151,7 @@ define firewall::router::munin($destination, $port_orig, $port_dest = '', $zone
}
}
-class firewall::router::torrent($destination, $zone = 'fw') {
+class firewall::router::torrent($destination, $zone = 'loc') {
shorewall::rule { "torrent-tcp":
action => 'DNAT',
source => 'all',