nfs-server on gretchaninov
[mirror/dsa-puppet.git] / modules / nfs-server / manifests / init.pp
index de4b940..bfc41bf 100644 (file)
@@ -20,33 +20,41 @@ class nfs-server {
                lw01,lw02,lw03,lw04: {
                        $client_range    = '10.0.0.0/8'
                }
-               milanollo: {
+               milanollo,senfter: {
                        $client_range    = '172.29.122.0/24'
                }
+               buxtehude,glinka: {
+                       $client_range    = '(192.168.2.0/24 209.87.16.34/32)'
+               }
+               gretchaninov: {
+                       $client_range    = '172.29.40.0/22'
+               }
                default: {
-                       $client_range    = '0.0.0.0/0'
+                       # Better than 0.0.0.0/0 - we really ought to configure a
+                       # client range for them all instead of exporting to the world.
+                       $client_range    = '127.0.0.0/8'
                }
        }
 
        @ferm::rule { 'dsa-portmap':
                description => 'Allow portmap access',
-               rule        => '&TCP_UDP_SERVICE_RANGE(111, $client_range)'
+               rule        => "&TCP_UDP_SERVICE_RANGE(111, $client_range)"
        }
        @ferm::rule { 'dsa-nfs':
                description => 'Allow nfsd access',
-               rule        => '&TCP_UDP_SERVICE_RANGE(2049, $client_range)'
+               rule        => "&TCP_UDP_SERVICE_RANGE(2049, $client_range)"
        }
        @ferm::rule { 'dsa-status':
                description => 'Allow statd access',
-               rule        => '&TCP_UDP_SERVICE_RANGE(10000, $client_range)'
+               rule        => "&TCP_UDP_SERVICE_RANGE(10000, $client_range)"
        }
        @ferm::rule { 'dsa-mountd':
                description => 'Allow mountd access',
-               rule        => '&TCP_UDP_SERVICE_RANGE(10002, $client_range)'
+               rule        => "&TCP_UDP_SERVICE_RANGE(10002, $client_range)"
        }
        @ferm::rule { 'dsa-lockd':
                description => 'Allow lockd access',
-               rule        => '&TCP_UDP_SERVICE_RANGE(10003, $client_range)'
+               rule        => "&TCP_UDP_SERVICE_RANGE(10003, $client_range)"
        }
 
        file { '/etc/default/nfs-common':