
This patch enables Firewalling in this Puppet modules in a flexible way. * Enable firewalling optionnaly (disabled by default). * Enable 'pre' firewalling with defaults rules. * Enable 'post' firewalling with DROP rule, with a debug option to disable it. * Enable default rules for all services (OpenStack, etc). * Ability to add custom firewall rules with Hiera * Update puppetlabs-firewall refs * Refactorize unit-tests
51 lines
1.3 KiB
Puppet
51 lines
1.3 KiB
Puppet
#
|
|
# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
# == Class: cloud::firewall::pre
|
|
#
|
|
# Firewall rules during 'pre' Puppet stage
|
|
#
|
|
class cloud::firewall::pre(
|
|
$firewall_settings = {},
|
|
){
|
|
|
|
# ensure the correct packages are installed
|
|
include firewall
|
|
|
|
# defaults 'pre' rules
|
|
cloud::firewall::rule{ '000 accept related established rules':
|
|
proto => 'all',
|
|
state => ['RELATED', 'ESTABLISHED'],
|
|
extras => $firewall_settings,
|
|
}
|
|
|
|
cloud::firewall::rule{ '001 accept all icmp':
|
|
proto => 'icmp',
|
|
extras => $firewall_settings,
|
|
}
|
|
|
|
cloud::firewall::rule{ '002 accept all to lo interface':
|
|
proto => 'all',
|
|
iniface => 'lo',
|
|
extras => $firewall_settings,
|
|
}
|
|
|
|
cloud::firewall::rule{ '003 accept ssh':
|
|
port => '22',
|
|
extras => $firewall_settings,
|
|
}
|
|
|
|
}
|