]> git.donarmstrong.com Git - dsa-puppet.git/blob - modules/ferm/manifests/per-host.pp
Merge branch 'master' of ssh://puppet.debian.org/srv/puppet.debian.org/git/dsa-puppet
[dsa-puppet.git] / modules / ferm / manifests / per-host.pp
1 class ferm::per-host {
2
3     case $hostname {
4         ancina,zandonai,zelenka: {
5            include ferm::zivit
6         }
7     }
8     case $hostname {
9         franck,gluck,kaufmann,kassia,klecker,lobos,morricone,raff,ries,rietz,saens,schein,senfl,steffani,valente,villa,wieck: {
10            include ferm::rsync
11         }
12     }
13
14     case $hostname {
15         chopin,franck,gluck,kassia,klecker,lobos,morricone,ravel,raff,ries,rietz,saens,schein,steffani,valente,villa,wieck: {
16            include ferm::ftp
17         }
18     }
19
20     case $hostname {
21         piatti,samosa: {
22            @ferm::rule { "dsa-udd-stunnel":
23                description  => "port 8080 for udd stunnel",
24                rule         => "&SERVICE_RANGE(tcp, http-alt, ( 192.25.206.16 70.103.162.29 217.196.43.134 ))"
25            }
26         }
27
28         paganini: {
29            @ferm::rule { "dsa-dhcp":
30                     description     => "Allow dhcp access",
31                     rule            => "&SERVICE(udp, 67)"
32            }
33            @ferm::rule { "dsa-tftp":
34                     description     => "Allow tftp access",
35                     rule            => "&SERVICE(udp, 69)"
36            }
37         }
38         handel: {
39            @ferm::rule { "dsa-puppet":
40                     description     => "Allow puppet access",
41                     rule            => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V4)"
42            }
43            @ferm::rule { "dsa-puppet-v6":
44                     domain          => 'ip6',
45                     description     => "Allow puppet access",
46                     rule            => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V6)"
47            }
48         }
49         powell: {
50            @ferm::rule { "dsa-powell-v6-tunnel":
51                     description     => "Allow powell to use V6 tunnel broker",
52                     rule            => "proto ipv6 saddr 212.227.117.6 jump ACCEPT"
53            }
54            @ferm::rule { "dsa-powell-btseed":
55                     domain          => "(ip ip6)",
56                     description     => "Allow powell to seed BT",
57                     rule            => "proto tcp dport 8000:8100 jump ACCEPT"
58            }
59            @ferm::rule { "dsa-powell-rsync":
60                     description     => "Hoster wants to sync from here, and why not",
61                     rule            => "&SERVICE_RANGE(tcp, rsync, ( 195.20.242.90 192.25.206.33 82.195.75.106 206.12.19.118 ))"
62            }
63         }
64         beethoven: {
65            @ferm::rule { "dsa-merikanto-beethoven":
66                     description     => "Allow merikanto",  # for nfs, and that uses all kind of ports by default.
67                     rule            => "source 172.22.127.147 interface bond0 jump ACCEPT",
68            }
69         }
70         heininen: {
71            @ferm::rule { "dsa-syslog":
72                     description     => "Allow syslog access",
73                     rule            => "&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V4)"
74            }
75            @ferm::rule { "dsa-syslog-v6":
76                     domain          => 'ip6',
77                     description     => "Allow syslog access",
78                     rule            => "&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V6)"
79            }
80         }
81         kaufmann: {
82            @ferm::rule { "dsa-hkp":
83                     domain          => "(ip ip6)",
84                     description     => "Allow hkp access",
85                     rule            => "&SERVICE(tcp, 11371)"
86            }
87         }
88         liszt: {
89            @ferm::rule { "smtp":
90                     domain          => "(ip ip6)",
91                     description     => "Allow smtp access",
92                     rule            => "&SERVICE(tcp, 25)"
93            }
94         }
95         draghi: {
96             @ferm::rule { "dsa-bind":
97                     domain          => "(ip ip6)",
98                     description     => "Allow nameserver access",
99                     rule            => "&TCP_UDP_SERVICE(53)"
100             }
101             @ferm::rule { "dsa-finger":
102                     domain          => "(ip ip6)",
103                     description     => "Allow finger access",
104                     rule            => "&SERVICE(tcp, 79)"
105             }
106             @ferm::rule { "dsa-ldap":
107                     domain          => "(ip ip6)",
108                     description     => "Allow ldap access",
109                     rule            => "&SERVICE(tcp, 389)"
110             }
111             @ferm::rule { "dsa-ldaps":
112                     domain          => "(ip ip6)",
113                     description     => "Allow ldaps access",
114                     rule            => "&SERVICE(tcp, 636)"
115             }
116         }
117     }
118 }