X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fferm%2Fmanifests%2Fper_host.pp;h=7e650f82cc3cea9dd09eba5a437af509f7290723;hb=d14bef114ef2ccf4032591cf97b973fdf525eff3;hp=f5c20737a0049acf420d3c4c94cbdc2cb175fe91;hpb=8ddf0b4d6f2318ab33b4fcef38e9224b27e98fa6;p=mirror%2Fdsa-puppet.git diff --git a/modules/ferm/manifests/per_host.pp b/modules/ferm/manifests/per_host.pp index f5c20737a..7e650f82c 100644 --- a/modules/ferm/manifests/per_host.pp +++ b/modules/ferm/manifests/per_host.pp @@ -163,6 +163,7 @@ class ferm::per_host { ${ join(getfromhash($site::allnodeinfo, 'wuiet.debian.org', 'ipHostNumber'), " ") } ${ join(getfromhash($site::allnodeinfo, 'respighi.debian.org', 'ipHostNumber'), " ") } ${ join(getfromhash($site::allnodeinfo, 'usper.debian.org', 'ipHostNumber'), " ") } + ${ join(getfromhash($site::allnodeinfo, 'ullmann.debian.org', 'ipHostNumber'), " ") } )) | EOF } @@ -249,6 +250,7 @@ class ferm::per_host { rule => @("EOF"/$) &SERVICE_RANGE(tcp, 5473, ( ${ join(getfromhash($site::allnodeinfo, 'lw07.debian.org', 'ipHostNumber'), " ") } + ${ join(getfromhash($site::allnodeinfo, 'snapshotdb-manda-01.debian.org', 'ipHostNumber'), " ") } \$HOST_PGBACKUPHOST )) | EOF @@ -265,6 +267,13 @@ class ferm::per_host { rule => '&SERVICE_RANGE(tcp, 5439, ( 2001:1af8:4020:b030::/64 ))' } } + snapshotdb-manda-01: { + @ferm::rule { 'dsa-postgres-snapshot': + domain => '(ip ip6)', + description => 'Allow postgress access from leaseweb (lw07 and friends)', + rule => '&SERVICE_RANGE(tcp, 5442, ( 185.17.185.176/28 2001:1af8:4020:b030::/64 ))' + } + } default: {} } # vpn fu @@ -295,11 +304,17 @@ REJECT reject-with icmp-admin-prohibited } } ubc-enc2bl01,ubc-enc2bl02,ubc-enc2bl09,ubc-enc2bl10: { - @ferm::rule { 'dsa-luca-fixme': - description => 'Allow ssh access from mnt and vpn networks', + @ferm::rule { 'dsa-ssh-priv': + description => 'Allow ssh access', rule => '&SERVICE_RANGE(tcp, 22, ( 172.29.40.0/22 172.29.203.0/24 ))', } } + ubc-node-arm01,ubc-node-arm02,ubc-node-arm03: { + @ferm::rule { 'dsa-ssh-priv': + description => 'Allow ssh access', + rule => '&SERVICE_RANGE(tcp, 22, ( 172.29.43.240 ))', + } + } default: {} } # tftp