diff options
| author | Micah Anderson <micah@riseup.net> | 2012-06-20 11:46:58 -0400 | 
|---|---|---|
| committer | Micah Anderson <micah@riseup.net> | 2012-06-20 11:46:58 -0400 | 
| commit | 58543cc4d02f9c47bec3c0d16561d53682881843 (patch) | |
| tree | faa78a536a84c5478cec31305826c9c0d04a6c4a /manifests/rules/out/puppet.pp | |
| parent | 6cb88973f53aa7d92414797dd21952c1c1d5da98 (diff) | |
| parent | be37ed29e196008209431f1401c040dd200e3019 (diff) | |
| download | puppet-shorewall-58543cc4d02f9c47bec3c0d16561d53682881843.tar.gz puppet-shorewall-58543cc4d02f9c47bec3c0d16561d53682881843.tar.bz2  | |
Merge remote-tracking branch 'immerda/master' into riseup
NOTE: the conflicts in the files/shorewall.conf.Debian.squeeze I resolved by
favoring the actual debian squeeze shorewall.conf, there were a few options
in the immerda one that were not the same.
Conflicts:
	README
	files/shorewall.conf.Debian.squeeze
	manifests/base.pp
	manifests/blacklist.pp
	manifests/debian.pp
	manifests/host.pp
	manifests/init.pp
	manifests/interface.pp
	manifests/masq.pp
	manifests/nat.pp
	manifests/params.pp
	manifests/policy.pp
	manifests/proxyarp.pp
	manifests/rfc1918.pp
	manifests/routestopped.pp
	manifests/rule.pp
	manifests/rule_section.pp
	manifests/rules/out/ekeyd.pp
	manifests/zone.pp
Diffstat (limited to 'manifests/rules/out/puppet.pp')
| -rw-r--r-- | manifests/rules/out/puppet.pp | 30 | 
1 files changed, 19 insertions, 11 deletions
diff --git a/manifests/rules/out/puppet.pp b/manifests/rules/out/puppet.pp index 5cd4643..cbe8cce 100644 --- a/manifests/rules/out/puppet.pp +++ b/manifests/rules/out/puppet.pp @@ -1,12 +1,20 @@ -class shorewall::rules::out::puppet { -    include ::shorewall::rules::puppet -    # we want to connect to the puppet server -    shorewall::rule { 'me-net-puppet_tcp': -        source          =>      '$FW', -        destination     =>      'net:$PUPPETSERVER', -        proto           =>      'tcp', -        destinationport =>      '$PUPPETSERVER_PORT,$PUPPETSERVER_SIGN_PORT', -        order           =>      340, -        action          =>      'ACCEPT'; -    } +class shorewall::rules::out::puppet( +  $puppetserver = "puppet.${::domain}", +  $puppetserver_port = 8140, +  $puppetserver_signport = 8141 +) { +  class{'shorewall::rules::puppet': +    puppetserver          => $puppetserver, +    puppetserver_port     => $puppetserver_port, +    puppetserver_signport => $puppetserver_signport, +  } +  # we want to connect to the puppet server +  shorewall::rule { 'me-net-puppet_tcp': +    source          =>      '$FW', +    destination     =>      'net:$PUPPETSERVER', +    proto           =>      'tcp', +    destinationport =>      '$PUPPETSERVER_PORT,$PUPPETSERVER_SIGN_PORT', +    order           =>      340, +    action          =>      'ACCEPT'; +  }  }  | 
