Skip to content

Commit

Permalink
Merge pull request voxpupuli#56 from traylenator/ports
Browse files Browse the repository at this point in the history
Use Stdlib::Port everywhere in place of Integer
  • Loading branch information
duritong authored Dec 14, 2020
2 parents b1085d8 + 94a8062 commit 5d71ec6
Show file tree
Hide file tree
Showing 22 changed files with 256 additions and 14 deletions.
2 changes: 1 addition & 1 deletion manifests/rules/ceph_mon.pp
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# Ceph is a distributed object store and file system.
# Enable this option to support Ceph's Monitor Daemon.
class nftables::rules::ceph_mon (
Array[Integer,1] $ports = [3300, 6789],
Array[Stdlib::Port,1] $ports = [3300, 6789],
) {
nftables::rule {
'default_in-ceph_mon':
Expand Down
4 changes: 2 additions & 2 deletions manifests/rules/dnat4.pp
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
# manage a ipv4 dnat rule
define nftables::rules::dnat4 (
Pattern[/^[12]?\d{1,2}\.[12]?\d{1,2}\.[12]?\d{1,2}\.[12]?\d{1,2}$/] $daddr,
Variant[String,Integer[1,65535]] $port,
Variant[String,Stdlib::Port] $port,
Pattern[/^[a-zA-Z0-9_]+$/] $rulename = $title,
Pattern[/^\d\d$/] $order = '50',
String[1] $chain = 'default_fwd',
Optional[String[1]] $iif = undef,
Enum['tcp','udp'] $proto = 'tcp',
Optional[Variant[String,Integer[1,65535]]] $dport = '',
Optional[Variant[String,Stdlib::Port]] $dport = '',
Enum['present','absent'] $ensure = 'present',
) {
$iifname = $iif ? {
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/dns.pp
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# manage in dns
class nftables::rules::dns (
Array[Integer,1] $ports = [53],
Array[Stdlib::Port,1] $ports = [53],
) {
nftables::rule {
'default_in-dns_tcp':
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/icinga2.pp
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# manage in icinga2
class nftables::rules::icinga2 (
Array[Integer,1] $ports = [5665],
Array[Stdlib::Port,1] $ports = [5665],
) {
nftables::rule {
'default_in-icinga2':
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/masquerade.pp
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
Optional[String[1]] $saddr = undef,
Optional[String[1]] $daddr = undef,
Optional[Enum['tcp','udp']] $proto = undef,
Optional[Variant[String,Integer[1,65535]]] $dport = undef,
Optional[Variant[String,Stdlib::Port]] $dport = undef,
Enum['present','absent'] $ensure = 'present',
) {
$oifname = $oif ? {
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/node_exporter.pp
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# manage in node exporter
class nftables::rules::node_exporter (
Optional[Variant[String,Array[String,1]]] $prometheus_server = undef,
Integer $port = 9100,
Stdlib::Port $port = 9100,
) {
if $prometheus_server {
any2array($prometheus_server).each |$index,$prom| {
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/out/ceph_client.pp
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# Object Storage Daemons (OSD), Metadata Server Daemons (MDS),
# and Manager Daemons (MGR).
class nftables::rules::out::ceph_client (
Array[Integer,1] $ports = [3300, 6789],
Array[Stdlib::Port,1] $ports = [3300, 6789],
) {
nftables::rule {
'default_out-ceph_client':
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/out/openafs_client.pp
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
# @see https://wiki.openafs.org/devel/AFSServicePorts/ AFS Service Ports
#
class nftables::rules::out::openafs_client (
Array[Integer,1] $ports = [7000, 7002, 7003],
Array[Stdlib::Port,1] $ports = [7000, 7002, 7003],
) {
include nftables::rules::out::kerberos

Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/out/puppet.pp
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# manage outgoing puppet
class nftables::rules::out::puppet (
Variant[Stdlib::IP::Address,Array[Stdlib::IP::Address,1]] $puppetserver,
Integer $puppetserver_port = 8140,
Stdlib::Port $puppetserver_port = 8140,
) {
Array($puppetserver, true).each |$index,$ps| {
nftables::rule {
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/snat4.pp
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
Optional[String[1]] $oif = undef,
Optional[String[1]] $saddr = undef,
Optional[Enum['tcp','udp']] $proto = undef,
Optional[Variant[String,Integer[1,65535]]] $dport = undef,
Optional[Variant[String,Stdlib::Port]] $dport = undef,
Enum['present','absent'] $ensure = 'present',
) {
$oifname = $oif ? {
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/ssh.pp
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# manage in ssh
class nftables::rules::ssh (
Array[Integer,1] $ports = [22],
Array[Stdlib::Port,1] $ports = [22],
) {
nftables::rule {
'default_in-ssh':
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/tor.pp
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# manage in tor
class nftables::rules::tor (
Array[Integer,1] $ports = [9001],
Array[Stdlib::Port,1] $ports = [9001],
) {
nftables::rule {
'default_in-tor':
Expand Down
2 changes: 1 addition & 1 deletion manifests/rules/wireguard.pp
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# manage in wireguard
class nftables::rules::wireguard (
Array[Integer,1] $ports = [51820],
Array[Stdlib::Port,1] $ports = [51820],
) {
nftables::rule {
'default_in-wireguard':
Expand Down
27 changes: 27 additions & 0 deletions spec/classes/rules/dns_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
require 'spec_helper'

describe 'nftables::rules::dns' do
on_supported_os.each do |os, os_facts|
context "on #{os}" do
let(:facts) { os_facts }

context 'default options' do
it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-dns_tcp').with_content('tcp dport {53} accept') }
it { is_expected.to contain_nftables__rule('default_in-dns_udp').with_content('udp dport {53} accept') }
end

context 'with ports set' do
let(:params) do
{
ports: [55, 60],
}
end

it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-dns_tcp').with_content('tcp dport {55, 60} accept') }
it { is_expected.to contain_nftables__rule('default_in-dns_udp').with_content('udp dport {55, 60} accept') }
end
end
end
end
25 changes: 25 additions & 0 deletions spec/classes/rules/icinga2_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
require 'spec_helper'

describe 'nftables::rules::icinga2' do
on_supported_os.each do |os, os_facts|
context "on #{os}" do
let(:facts) { os_facts }

context 'default options' do
it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-icinga2').with_content('tcp dport {5665} accept') }
end

context 'with ports set' do
let(:params) do
{
ports: [55, 60],
}
end

it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-icinga2').with_content('tcp dport {55, 60} accept') }
end
end
end
end
33 changes: 33 additions & 0 deletions spec/classes/rules/node_exporter_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
require 'spec_helper'

describe 'nftables::rules::node_exporter' do
on_supported_os.each do |os, os_facts|
context "on #{os}" do
let(:facts) { os_facts }

context 'default options' do
it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-node_exporter').with_content('tcp dport 9100 accept') }
end

context 'with port set' do
let(:params) do
{
port: 100,
}
end

it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-node_exporter').with_content('tcp dport 100 accept') }
context 'with prometheus_server set' do
let(:params) do
super().merge({ prometheus_server: ['127.0.0.1', '::1'] })
end

it { is_expected.to contain_nftables__rule('default_in-node_exporter-0').with_content('ip saddr 127.0.0.1 tcp dport 100 accept') }
it { is_expected.to contain_nftables__rule('default_in-node_exporter-1').with_content('ip6 saddr ::1 tcp dport 100 accept') }
end
end
end
end
end
25 changes: 25 additions & 0 deletions spec/classes/rules/ssh_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
require 'spec_helper'

describe 'nftables::rules::ssh' do
on_supported_os.each do |os, os_facts|
context "on #{os}" do
let(:facts) { os_facts }

context 'default options' do
it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-ssh').with_content('tcp dport {22} accept') }
end

context 'with ports set' do
let(:params) do
{
ports: [55, 60],
}
end

it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-ssh').with_content('tcp dport {55, 60} accept') }
end
end
end
end
25 changes: 25 additions & 0 deletions spec/classes/rules/tor_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
require 'spec_helper'

describe 'nftables::rules::tor' do
on_supported_os.each do |os, os_facts|
context "on #{os}" do
let(:facts) { os_facts }

context 'default options' do
it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-tor').with_content('tcp dport {9001} accept') }
end

context 'with ports set' do
let(:params) do
{
ports: [55, 60],
}
end

it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-tor').with_content('tcp dport {55, 60} accept') }
end
end
end
end
25 changes: 25 additions & 0 deletions spec/classes/rules/wireguard_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
require 'spec_helper'

describe 'nftables::rules::wireguard' do
on_supported_os.each do |os, os_facts|
context "on #{os}" do
let(:facts) { os_facts }

context 'default options' do
it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-wireguard').with_content('udp dport {51820} accept') }
end

context 'with ports set' do
let(:params) do
{
ports: [55, 60],
}
end

it { is_expected.to compile }
it { is_expected.to contain_nftables__rule('default_in-wireguard').with_content('udp dport {55, 60} accept') }
end
end
end
end
24 changes: 24 additions & 0 deletions spec/defines/rules/dnat4_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
require 'spec_helper'

describe 'nftables::rules::dnat4' do
let(:title) { 'foobar' }

on_supported_os.each do |os, facts|
context "on #{os}" do
let(:facts) do
facts
end

context 'with minumum parameters' do
let(:params) do
{
daddr: '127.127.127.127',
port: 100,
}
end

it { is_expected.to compile.with_all_deps }
end
end
end
end
27 changes: 27 additions & 0 deletions spec/defines/rules/masquerade_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
require 'spec_helper'

describe 'nftables::rules::masquerade' do
let(:title) { 'foobar' }

on_supported_os.each do |os, facts|
context "on #{os}" do
let(:facts) do
facts
end

context 'with default parameters' do
it { is_expected.to compile.with_all_deps }
it { is_expected.to contain_nftables__rule('POSTROUTING-foobar').with_content('masquerade') }
end
context 'with dport specified' do
let(:params) do
{
dport: 1000
}
end

it { is_expected.to contain_nftables__rule('POSTROUTING-foobar').with_content('tcp dport 1000 masquerade') }
end
end
end
end
31 changes: 31 additions & 0 deletions spec/defines/rules/snat4_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
require 'spec_helper'

describe 'nftables::rules::snat4' do
let(:title) { 'foobar' }

on_supported_os.each do |os, facts|
context "on #{os}" do
let(:facts) do
facts
end

context 'with snat specified' do
let(:params) do
{
snat: 'sausage',
}
end

it { is_expected.to compile.with_all_deps }
it { is_expected.to contain_nftables__rule('POSTROUTING-foobar').with_content('snat sausage') }
context 'with dport specified' do
let(:params) do
super().merge(dport: 1234)
end

it { is_expected.to contain_nftables__rule('POSTROUTING-foobar').with_content('tcp dport 1234 snat sausage') }
end
end
end
end
end

0 comments on commit 5d71ec6

Please sign in to comment.