X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fferm%2Fmanifests%2Fper-host.pp;h=47c8a398b7c8bd9d4e817ea448839aaf9e83b770;hb=47b04966e365090f6720ae0a67ff1c9793e3d252;hp=79fe097813c2f2d33759cbd635bd20acbb3bc77c;hpb=c8c17995192ae46f8800edfdbbd5a7093bd8722d;p=mirror%2Fdsa-puppet.git diff --git a/modules/ferm/manifests/per-host.pp b/modules/ferm/manifests/per-host.pp index 79fe09781..47c8a398b 100644 --- a/modules/ferm/manifests/per-host.pp +++ b/modules/ferm/manifests/per-host.pp @@ -6,13 +6,7 @@ class ferm::per-host { } case $hostname { - chopin,franck,gluck,kaufmann,kassia,klecker,lobos,merikanto,merkel,morricone,ravel,ries,rietz,saens,schein,senfl,stabile,steffani,valente,villa,wieck,wolkenstein: { - include ferm::rsync - } - } - - case $hostname { - chopin,franck,gluck,kassia,klecker,lobos,morricone,ravel,ries,rietz,saens,schein,steffani,valente,villa,wieck,stabile: { + chopin,franck,gluck,kassia,klecker,lobos,morricone,ravel,ries,rietz,saens,schein,santoro,steffani,valente,villa,wieck,stabile: { include ferm::ftp } } @@ -27,10 +21,16 @@ class ferm::per-host { danzi: { @ferm::rule { "dsa-postgres-danzi": description => "Allow postgress access", - rule => "&SERVICE_RANGE(tcp, 5433, ( 206.12.19.0/24 ))" + rule => "&SERVICE_RANGE(tcp, (5433, 5437), ( 206.12.19.0/24 ))" } } + abel,alwyn,rietz: { + @ferm::rule { "dsa-tftp": + description => "Allow tftp access", + rule => "&SERVICE(udp, 69)" + } + } paganini: { @ferm::rule { "dsa-dhcp": description => "Allow dhcp access", @@ -62,10 +62,6 @@ class ferm::per-host { description => "Allow powell to seed BT", rule => "proto tcp dport 8000:8100 jump ACCEPT" } - @ferm::rule { "dsa-powell-rsync": - description => "Hoster wants to sync from here, and why not", - rule => "&SERVICE_RANGE(tcp, rsync, ( 195.20.242.90 192.25.206.33 82.195.75.106 206.12.19.118 ))" - } } heininen,lotti: { @ferm::rule { "dsa-syslog": @@ -85,6 +81,13 @@ class ferm::per-host { rule => "&SERVICE(tcp, 11371)" } } + gombert: { + @ferm::rule { "dsa-infinoted": + domain => "(ip ip6)", + description => "Allow infinoted access", + rule => "&SERVICE(tcp, 6523)" + } + } liszt: { @ferm::rule { "smtp": domain => "(ip ip6)", @@ -132,6 +135,13 @@ class ferm::per-host { rule => "&TCP_UDP_SERVICE(5080)" } } + scelsi: { + @ferm::rule { "dc11-icecast": + domain => "(ip ip6)", + description => "Allow icecast access", + rule => "&SERVICE(tcp, 8000)" + } + } } case $hostname { rautavaara,luchesi: { @@ -154,6 +164,7 @@ class ferm::per-host { proto udp dport (53 123) ACCEPT; proto tcp dport 8140 daddr 82.195.75.104 ACCEPT; # puppethost proto tcp dport 5140 daddr (82.195.75.98 206.12.19.121) ACCEPT; # loghost + proto tcp dport 11371 daddr 82.195.75.107 ACCEPT; # keyring host proto tcp dport (25 submission) daddr ($HOST_MAILRELAY_V4) ACCEPT ' } @@ -208,7 +219,7 @@ class ferm::per-host { @ferm::rule { "dsa-nat-snapshot-varnish": table => 'nat', chain => 'PREROUTING', - rule => 'proto tcp daddr 193.62.202.28 dport 80 REDIRECT to-ports 6081', + rule => 'proto tcp daddr 193.62.202.30 dport 80 REDIRECT to-ports 6081', } } stabile: {