projects
/
mirror
/
dsa-puppet.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
add archive bind address for klecker
[mirror/dsa-puppet.git]
/
modules
/
nfs-server
/
manifests
/
init.pp
diff --git
a/modules/nfs-server/manifests/init.pp
b/modules/nfs-server/manifests/init.pp
index
de4b940
..
c44838d
100644
(file)
--- a/
modules/nfs-server/manifests/init.pp
+++ b/
modules/nfs-server/manifests/init.pp
@@
-20,33
+20,44
@@
class nfs-server {
lw01,lw02,lw03,lw04: {
$client_range = '10.0.0.0/8'
}
lw01,lw02,lw03,lw04: {
$client_range = '10.0.0.0/8'
}
- milanollo: {
+ milanollo
,senfter
: {
$client_range = '172.29.122.0/24'
}
$client_range = '172.29.122.0/24'
}
+ buxtehude: {
+ $client_range = '(172.29.40.0/22 206.12.19.126/32)'
+ }
+ glinka: {
+ $client_range = '(209.87.16.37/32 209.87.16.38/32)'
+ }
+ gretchaninov: {
+ $client_range = '172.29.40.0/22'
+ }
default: {
default: {
- $client_range = '0.0.0.0/0'
+ # Better than 0.0.0.0/0 - we really ought to configure a
+ # client range for them all instead of exporting to the world.
+ $client_range = '127.0.0.0/8'
}
}
@ferm::rule { 'dsa-portmap':
description => 'Allow portmap access',
}
}
@ferm::rule { 'dsa-portmap':
description => 'Allow portmap access',
- rule =>
'&TCP_UDP_SERVICE_RANGE(111, $client_range)'
+ rule =>
"&TCP_UDP_SERVICE_RANGE(111, $client_range)"
}
@ferm::rule { 'dsa-nfs':
description => 'Allow nfsd access',
}
@ferm::rule { 'dsa-nfs':
description => 'Allow nfsd access',
- rule =>
'&TCP_UDP_SERVICE_RANGE(2049, $client_range)'
+ rule =>
"&TCP_UDP_SERVICE_RANGE(2049, $client_range)"
}
@ferm::rule { 'dsa-status':
description => 'Allow statd access',
}
@ferm::rule { 'dsa-status':
description => 'Allow statd access',
- rule =>
'&TCP_UDP_SERVICE_RANGE(10000, $client_range)'
+ rule =>
"&TCP_UDP_SERVICE_RANGE(10000, $client_range)"
}
@ferm::rule { 'dsa-mountd':
description => 'Allow mountd access',
}
@ferm::rule { 'dsa-mountd':
description => 'Allow mountd access',
- rule =>
'&TCP_UDP_SERVICE_RANGE(10002, $client_range)'
+ rule =>
"&TCP_UDP_SERVICE_RANGE(10002, $client_range)"
}
@ferm::rule { 'dsa-lockd':
description => 'Allow lockd access',
}
@ferm::rule { 'dsa-lockd':
description => 'Allow lockd access',
- rule =>
'&TCP_UDP_SERVICE_RANGE(10003, $client_range)'
+ rule =>
"&TCP_UDP_SERVICE_RANGE(10003, $client_range)"
}
file { '/etc/default/nfs-common':
}
file { '/etc/default/nfs-common':