}
}
-class firewall::vserver::puppetmaster($destination, $puppetmaster_port = '8140', $puppetmaster_nonssl_port = '8141') {
+class firewall::vserver::puppetmaster($destination, $puppetmaster_port = '8140', $puppetmaster_nonssl_port = '8141', $zone = 'fw') {
shorewall::rule { 'puppetmaster-1':
action => 'DNAT',
source => 'net',
- destination => "fw:$destination:$puppetmaster_port",
+ destination => "$zone:$destination:$puppetmaster_port",
proto => 'tcp',
destinationport => "$puppetmaster_port",
ratelimit => '-',
shorewall::rule { 'puppetmaster-2':
action => 'DNAT',
source => 'net',
- destination => "fw:$destination:$puppetmaster_port",
+ destination => "$zone:$destination:$puppetmaster_port",
proto => 'udp',
destinationport => "$puppetmaster_port",
ratelimit => '-',
shorewall::rule { 'puppetmaster-3':
action => 'DNAT',
source => '$FW',
- destination => "fw:$destination:$puppetmaster_port",
+ destination => "$zone:$destination:$puppetmaster_port",
proto => 'tcp',
destinationport => "$puppetmaster_port",
originaldest => "$ipaddress",
shorewall::rule { 'puppetmaster-4':
action => 'DNAT',
source => '$FW',
- destination => "fw:$destination:$puppetmaster_port",
+ destination => "$zone:$destination:$puppetmaster_port",
proto => 'udp',
destinationport => "$puppetmaster_port",
originaldest => "$ipaddress",
shorewall::rule { 'puppetmaster-5':
action => 'DNAT',
source => 'net',
- destination => "fw:$destination:$puppetmaster_nonssl_port",
+ destination => "$zone:$destination:$puppetmaster_nonssl_port",
proto => 'tcp',
destinationport => "$puppetmaster_nonssl_port",
ratelimit => '-',
shorewall::rule { 'puppetmaster-6':
action => 'DNAT',
source => 'net',
- destination => "fw:$destination:$puppetmaster_nonssl_port",
+ destination => "$zone:$destination:$puppetmaster_nonssl_port",
proto => 'udp',
destinationport => "$puppetmaster_nonssl_port",
ratelimit => '-',
shorewall::rule { 'puppetmaster-7':
action => 'DNAT',
source => '$FW',
- destination => "fw:$destination:$puppetmaster_nonssl_port",
+ destination => "$zone:$destination:$puppetmaster_nonssl_port",
proto => 'tcp',
destinationport => "$puppetmaster_nonssl_port",
originaldest => "$ipaddress",
shorewall::rule { 'puppetmaster-8':
action => 'DNAT',
source => '$FW',
- destination => "fw:$destination:$puppetmaster_nonssl_port",
+ destination => "$zone:$destination:$puppetmaster_nonssl_port",
proto => 'udp',
destinationport => "$puppetmaster_nonssl_port",
originaldest => "$ipaddress",
}
}
-class firewall::vserver::gitd($destination) {
+class firewall::vserver::gitd($destination, $zone = 'fw') {
shorewall::rule { 'git-daemon-1':
action => 'DNAT',
source => 'net',
- destination => "fw:$destination:9418",
+ destination => "$zone:$destination:9418",
proto => 'tcp',
destinationport => '9418',
ratelimit => '-',
shorewall::rule { 'git-daemon-2':
action => 'DNAT',
source => '$FW',
- destination => "fw:$destination:9418",
+ destination => "$zone:$destination:9418",
proto => 'tcp',
destinationport => '9418',
originaldest => "$ipaddress",
}
}
-class firewall::vserver::icecast($destination) {
+class firewall::vserver::icecast($destination, $zone = 'fw') {
shorewall::rule { 'icecast-1':
action => 'DNAT',
source => 'net',
- destination => "fw:$destination:8000",
+ destination => "$zone:$destination:8000",
proto => 'tcp',
destinationport => '8000',
ratelimit => '-',
shorewall::rule { 'icecast-2':
action => 'DNAT',
source => '$FW',
- destination => "fw:$destination:8000",
+ destination => "$zone:$destination:8000",
proto => 'tcp',
destinationport => '8000',
originaldest => "$ipaddress",
}
}
-class firewall::vserver::mail($destination) {
+class firewall::vserver::mail($destination, $zone = 'fw') {
shorewall::rule { 'mail-1':
action => 'DNAT',
source => 'net',
- destination => "fw:$destination:25",
+ destination => "$zone:$destination:25",
proto => 'tcp',
destinationport => '25',
ratelimit => '-',
shorewall::rule { 'mail-2':
action => 'DNAT',
source => '$FW',
- destination => "fw:$destination:25",
+ destination => "$zone:$destination:25",
proto => 'tcp',
destinationport => '25',
originaldest => "$ipaddress",
shorewall::rule { 'mail-3':
action => 'DNAT',
source => 'net',
- destination => "fw:$destination:993",
+ destination => "$zone:$destination:993",
proto => 'tcp',
destinationport => '993',
ratelimit => '-',
shorewall::rule { 'mail-4':
action => 'DNAT',
source => '$FW',
- destination => "fw:$destination:993",
+ destination => "$zone:$destination:993",
proto => 'tcp',
destinationport => '993',
originaldest => "$ipaddress",
}
}
-define firewall::vserver::munin($destination, $port_orig, $port_dest = '', $order = '400') {
+define firewall::vserver::munin($destination, $port_orig, $port_dest = '', $order = '400', $zone = 'fw') {
shorewall::rule { "munin-$name-1":
action => 'DNAT',
source => 'net',
destination => $port_dest ? {
- '' => "fw:$destination",
- default => "fw:$destination:$port_dest",
+ '' => "$zone:$destination",
+ default => "$zone:$destination:$port_dest",
},
proto => 'tcp',
destinationport => "$port_orig",
action => 'DNAT',
source => '$FW',
destination => $port_dest ? {
- '' => "fw:$destination",
- default => "fw:$destination:$port_dest",
+ '' => "$zone:$destination",
+ default => "$zone:$destination:$port_dest",
},
proto => 'tcp',
destinationport => "$port_orig",