From 448de48f8d748c8101e35bcdbc0ced858557d4a8 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Torbj=C3=B6rn=20L=C3=B6nnemark?= <tobbez@ryara.net>
Date: Mon, 16 Dec 2024 16:32:11 +0100
Subject: [PATCH] Adapt to renamed puppetlabs-firewall parameters

---
 manifests/system.pp | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/manifests/system.pp b/manifests/system.pp
index cf02efb..2226689 100644
--- a/manifests/system.pp
+++ b/manifests/system.pp
@@ -48,7 +48,7 @@ class analysator::system::nat {
     dport => '22',
     source => '! 130.236.254.0/24',
     proto => 'tcp',
-    action => 'reject',
+    jump => 'reject',
   }
 
   # CVE-2024-6387 ("regreSSHion")
@@ -58,8 +58,8 @@ class analysator::system::nat {
     dport => '22',
     source => '! 2001:6b0:17:f0a0::/64',
     proto => 'tcp',
-    action => 'reject',
-    provider => 'ip6tables',
+    jump => 'reject',
+    protocol => 'ip6tables',
   }
 
   firewall { '200 forward internal':
@@ -67,7 +67,7 @@ class analysator::system::nat {
     iniface  => $analysator::system::internal_iface,
     outiface => $analysator::system::public_iface,
     proto    => 'all',
-    action   => 'accept',
+    jump     => 'accept',
   }
 
   firewall { '201 forward internal':
@@ -75,7 +75,7 @@ class analysator::system::nat {
     outiface => $analysator::system::internal_iface,
     iniface  => $analysator::system::public_iface,
     proto    => 'all',
-    action   => 'accept',
+    jump     => 'accept',
   }
 
   firewall { '202 forward ib':
@@ -83,7 +83,7 @@ class analysator::system::nat {
     outiface => $analysator::system::public_iface,
     iniface  => $analysator::system::ib_iface,
     proto    => 'all',
-    action   => 'accept',
+    jump     => 'accept',
   }
 
   firewall { '203 forward ib':
@@ -91,7 +91,7 @@ class analysator::system::nat {
     outiface => $analysator::system::ib_iface,
     iniface  => $analysator::system::public_iface,
     proto    => 'all',
-    action   => 'accept',
+    jump     => 'accept',
   }
 
 
-- 
GitLab