diff options
author | Jenkins <jenkins@review.openstack.org> | 2015-07-10 18:48:13 +0000 |
---|---|---|
committer | Gerrit Code Review <review@openstack.org> | 2015-07-10 18:48:13 +0000 |
commit | 8011d70a80501e4f5cccf0be7d870fba677a3c7c (patch) | |
tree | 454dd8eebb763b5751d444fda8ee7c7dccedfb4e /manifests/firewall/pre.pp | |
parent | 77662b64a928db04820041fb0fcf764387600f0a (diff) | |
parent | d091e46dc061d81c3a9e2f561efa15a4ee94a187 (diff) |
Merge "Implement Advanced Firewalling support"
Diffstat (limited to 'manifests/firewall/pre.pp')
-rw-r--r-- | manifests/firewall/pre.pp | 57 |
1 files changed, 57 insertions, 0 deletions
diff --git a/manifests/firewall/pre.pp b/manifests/firewall/pre.pp new file mode 100644 index 0000000..2d7203a --- /dev/null +++ b/manifests/firewall/pre.pp @@ -0,0 +1,57 @@ +# +# Copyright (C) 2015 eNovance SAS <licensing@enovance.com> +# +# Licensed under the Apache License, Version 2.0 (the "License"); you may +# not use this file except in compliance with the License. You may obtain +# a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT +# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the +# License for the specific language governing permissions and limitations +# under the License. +# +# == Class: tripleo::firewall::pre +# +# Firewall rules during 'pre' Puppet stage +# +# === Parameters: +# +# [*firewall_settings*] +# (optional) Allow to add custom parameters to firewall rules +# Should be an hash. +# Default to {} +# +class tripleo::firewall::pre( + $firewall_settings = {}, +){ + + # ensure the correct packages are installed + include ::firewall + + # defaults 'pre' rules + tripleo::firewall::rule{ '000 accept related established rules': + proto => 'all', + state => ['RELATED', 'ESTABLISHED'], + extras => $firewall_settings, + } + + tripleo::firewall::rule{ '001 accept all icmp': + proto => 'icmp', + extras => $firewall_settings, + } + + tripleo::firewall::rule{ '002 accept all to lo interface': + proto => 'all', + iniface => 'lo', + extras => $firewall_settings, + } + + tripleo::firewall::rule{ '003 accept ssh': + port => '22', + extras => $firewall_settings, + } + +} |