From 448de48f8d748c8101e35bcdbc0ced858557d4a8 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Torbj=C3=B6rn=20L=C3=B6nnemark?= <tobbez@ryara.net> Date: Mon, 16 Dec 2024 16:32:11 +0100 Subject: [PATCH] Adapt to renamed puppetlabs-firewall parameters --- manifests/system.pp | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/manifests/system.pp b/manifests/system.pp index cf02efb..2226689 100644 --- a/manifests/system.pp +++ b/manifests/system.pp @@ -48,7 +48,7 @@ class analysator::system::nat { dport => '22', source => '! 130.236.254.0/24', proto => 'tcp', - action => 'reject', + jump => 'reject', } # CVE-2024-6387 ("regreSSHion") @@ -58,8 +58,8 @@ class analysator::system::nat { dport => '22', source => '! 2001:6b0:17:f0a0::/64', proto => 'tcp', - action => 'reject', - provider => 'ip6tables', + jump => 'reject', + protocol => 'ip6tables', } firewall { '200 forward internal': @@ -67,7 +67,7 @@ class analysator::system::nat { iniface => $analysator::system::internal_iface, outiface => $analysator::system::public_iface, proto => 'all', - action => 'accept', + jump => 'accept', } firewall { '201 forward internal': @@ -75,7 +75,7 @@ class analysator::system::nat { outiface => $analysator::system::internal_iface, iniface => $analysator::system::public_iface, proto => 'all', - action => 'accept', + jump => 'accept', } firewall { '202 forward ib': @@ -83,7 +83,7 @@ class analysator::system::nat { outiface => $analysator::system::public_iface, iniface => $analysator::system::ib_iface, proto => 'all', - action => 'accept', + jump => 'accept', } firewall { '203 forward ib': @@ -91,7 +91,7 @@ class analysator::system::nat { outiface => $analysator::system::ib_iface, iniface => $analysator::system::public_iface, proto => 'all', - action => 'accept', + jump => 'accept', } -- GitLab