10 service { 'nfs-common':
12 status => '/bin/true',
14 service { 'nfs-kernel-server':
16 status => '/bin/true',
20 lw01,lw02,lw03,lw04: {
21 $client_range = '10.0.0.0/8'
24 $client_range = '172.29.122.0/24'
27 $client_range = '(172.29.40.0/22 206.12.19.126/32)'
30 $client_range = '(209.87.16.37/32 209.87.16.38/32)'
33 $client_range = '172.29.40.0/22'
36 # Better than 0.0.0.0/0 - we really ought to configure a
37 # client range for them all instead of exporting to the world.
38 $client_range = '127.0.0.0/8'
42 @ferm::rule { 'dsa-portmap':
43 description => 'Allow portmap access',
44 rule => "&TCP_UDP_SERVICE_RANGE(111, $client_range)"
46 @ferm::rule { 'dsa-nfs':
47 description => 'Allow nfsd access',
48 rule => "&TCP_UDP_SERVICE_RANGE(2049, $client_range)"
50 @ferm::rule { 'dsa-status':
51 description => 'Allow statd access',
52 rule => "&TCP_UDP_SERVICE_RANGE(10000, $client_range)"
54 @ferm::rule { 'dsa-mountd':
55 description => 'Allow mountd access',
56 rule => "&TCP_UDP_SERVICE_RANGE(10002, $client_range)"
58 @ferm::rule { 'dsa-lockd':
59 description => 'Allow lockd access',
60 rule => "&TCP_UDP_SERVICE_RANGE(10003, $client_range)"
63 file { '/etc/default/nfs-common':
64 source => 'puppet:///modules/nfs-server/nfs-common.default',
65 before => Package['nfs-common'],
66 notify => Service['nfs-common'],
68 file { '/etc/default/nfs-kernel-server':
69 source => 'puppet:///modules/nfs-server/nfs-kernel-server.default',
70 before => Package['nfs-kernel-server'],
71 notify => Service['nfs-kernel-server'],
73 file { '/etc/modprobe.d/lockd.local':
74 source => 'puppet:///modules/nfs-server/lockd.local.modprobe',
75 before => Package['nfs-common'],
76 notify => Service['nfs-common'],