X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=manifests%2Fsite.pp;h=d119402a5fdb9dee5396a643f4fdf653f7d90e13;hb=8ac30211377dcd7c63376778976bddc31c835016;hp=30a4bbb0287b262360b9d6f667ccaa11b6591185;hpb=66790348eebf706ef06ef5c8a78f56fc6df0ef4d;p=mirror%2Fdsa-puppet.git diff --git a/manifests/site.pp b/manifests/site.pp index 30a4bbb02..d119402a5 100644 --- a/manifests/site.pp +++ b/manifests/site.pp @@ -74,23 +74,70 @@ node default { } case extractnodeinfo($nodeinfo, 'buildd') { - true: { include buildd } + 'true': { + include buildd + case $kernel { + Linux: { + include ferm + } + } + } } case $hostname { klecker,ravel,senfl,orff: { include named::secondary } geo1,geo2,geo3: { include named::geodns } - bartok: { include named::recursor } - } - - case $hostname { - senfl: { include rsync } + bartok,schein,steffani: { include named::recursor } } case $hostname { - logtest01,geo1,geo2,geo3,bartok,senfl: { include ferm } + logtest01,geo1,geo2,geo3,bartok,senfl,beethoven,piatti,saens,villa,lobos,raff,gluck,schein,wieck,steffani,ball,handel,tchaikovsky: { include ferm } } + case $hostname { + piatti: { + @ferm::rule { "dsa-udd-stunnel": + description => "port 8080 for udd stunnel", + rule => "&SERVICE_RANGE(tcp, http-alt, ( 192.25.206.16 70.103.162.29 217.196.43.134 ))" + } + } + senfl: { + @ferm::rule { "dsa-rsync": + domain => "(ip ip6)", + description => "Allow rsync access", + rule => "&SERVICE(tcp, 873)" + } + } + saens,villa,lobos,raff,gluck,schein,wieck,steffani: { + @ferm::rule { "dsa-ftp": + domain => "(ip ip6)", + description => "Allow ftp access", + rule => "&SERVICE(tcp, 21)" + } + @ferm::rule { "dsa-rsync": + domain => "(ip ip6)", + description => "Allow rsync access", + rule => "&SERVICE(tcp, 873)" + } + } + ancina,zelenka: { + @ferm::rule { "dsa-time": + description => "Allow time access", + rule => "&SERVICE_RANGE(tcp, time, \$HOST_NAGIOS_V4)" + } + } + handel: { + @ferm::rule { "dsa-puppet": + description => "Allow puppet access", + rule => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V4)" + } + @ferm::rule { "dsa-puppet-v6": + domain => 'ip6', + description => "Allow puppet access", + rule => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V6)" + } + } + } case $brokenhosts { "true": { include hosts } }