On 02/12/2016 07:11 AM, Alex Harvey wrote:
ACCEPT tcp -- 1.1.1.1/24 0.0.0.0/0 multiport dports
80,443 /* 100 allow http and https access */
ACCEPT tcp -- 2.2.2.2/24 0.0.0.0/0 multiport dports
80,443 /* 100 allow http and https access */
The provider could be modified so as to represent these as:
<snip>
Conceptionally, it might just work. But it would be quite hard, and
create a maintenance nightmare. (Have you *looked* at the current
provider instances/parsing methods? Oh my...)
2.
Add to the firewall module (or perhaps a new Forge module) a defined
type that wraps around the existing firewall types/providers. In
Puppet 4, that should be easy to do in the DSL using an iterator; but
because I'd like to support Puppet 3 as well, it's a bit trickier.
Still, quite doable. The hardest part seems to be thinking up a name
for the new type. Any suggestions?
While naming things *is* one of the hardest problems in software, I'm
sure we can figure something out on this one. No worries.
Iterating on the DSL level is nice and all, but it will cause issues for
users who don't purge unmanaged firewall rules (granted, that should be
a rare issue, but then I'm willing to bet that there are people with
weird edge cases like that.)
The problem is that removing sources from the array of your multiplexer
resource will just lead to some firewall resources not being in the
catalog anymore. Their respective rules will remain orphaned, which is
not what the user will expect.
Cheers,
Felix
--
You received this message because you are subscribed to the Google Groups "Puppet
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to puppet-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/puppet-users/56BE6374.8020009%40Alumni.TU-Berlin.de.
For more options, visit https://groups.google.com/d/optout.