Skip to content

Commit 0070c25

Browse files
authored
Merge pull request #1084 from puppetlabs/CONT-256-module_cleanup
(CONT-256) Removing outdated code
2 parents 3739745 + cdcbfcb commit 0070c25

File tree

11 files changed

+34
-172
lines changed

11 files changed

+34
-172
lines changed

lib/facter/iptables_persistent_version.rb

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,7 @@
55
setcode do
66
# Throw away STDERR because dpkg >= 1.16.7 will make some noise if the
77
# package isn't currently installed.
8-
os = Facter.value(:operatingsystem)
9-
os_release = Facter.value(:operatingsystemrelease)
10-
cmd = if (os == 'Debian' && (Puppet::Util::Package.versioncmp(os_release, '8.0') >= 0)) ||
11-
(os == 'Ubuntu' && (Puppet::Util::Package.versioncmp(os_release, '14.10') >= 0)) ||
12-
(os == 'Debian' && (Puppet::Util::Package.versioncmp(os_release, 'unstable') >= 0))
13-
"dpkg-query -Wf '${Version}' netfilter-persistent 2>/dev/null"
14-
else
15-
"dpkg-query -Wf '${Version}' iptables-persistent 2>/dev/null"
16-
end
8+
cmd = "dpkg-query -Wf '${Version}' netfilter-persistent 2>/dev/null"
179
version = Facter::Core::Execution.execute(cmd)
1810

1911
if version.nil? || !version.match(%r{\d+\.\d+})

lib/puppet/type/firewall.rb

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2342,12 +2342,9 @@ def should_to_s(value)
23422342
end
23432343
end
23442344

2345-
# autobefore is only provided since puppet 4.0
2346-
if Puppet::Util::Package.versioncmp(Puppet.version, '4.0') >= 0
2347-
# On RHEL 7 this needs to be threaded correctly to manage SE Linux permissions after persisting the rules
2348-
autobefore(:file) do
2349-
['/etc/sysconfig/iptables', '/etc/sysconfig/ip6tables']
2350-
end
2345+
# On RHEL 7 this needs to be threaded correctly to manage SE Linux permissions after persisting the rules
2346+
autobefore(:file) do
2347+
['/etc/sysconfig/iptables', '/etc/sysconfig/ip6tables']
23512348
end
23522349

23532350
validate do

manifests/linux/debian.pp

Lines changed: 8 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -26,38 +26,17 @@
2626
$package_ensure = $firewall::params::package_ensure,
2727
) inherits ::firewall::params {
2828
if $package_name {
29-
#Fixes hang while installing iptables-persistent on debian 8
30-
exec { 'iptables-persistent-debconf':
31-
command => "/bin/echo \"${package_name} ${package_name}/autosave_v4 boolean false\" |
32-
/usr/bin/debconf-set-selections && /bin/echo \"${package_name} ${package_name}/autosave_v6 boolean false\" |
33-
/usr/bin/debconf-set-selections",
34-
35-
refreshonly => true,
36-
}
3729
ensure_packages([$package_name], {
38-
ensure => $package_ensure,
39-
require => Exec['iptables-persistent-debconf']
30+
ensure => $package_ensure
4031
})
4132
}
4233

43-
if($::operatingsystemrelease =~ /^6\./ and $enable == true and $::iptables_persistent_version
44-
and versioncmp($::iptables_persistent_version, '0.5.0') < 0) {
45-
# This fixes a bug in the iptables-persistent LSB headers in 6.x, without it
46-
# we lose idempotency
47-
exec { 'iptables-persistent-enable':
48-
logoutput => on_failure,
49-
command => '/usr/sbin/update-rc.d iptables-persistent enable',
50-
unless => '/usr/bin/test -f /etc/rcS.d/S*iptables-persistent',
51-
require => Package[$package_name],
52-
}
53-
} else {
54-
# This isn't a real service/daemon. The start action loads rules, so just
55-
# needs to be called on system boot.
56-
service { $service_name:
57-
ensure => undef,
58-
enable => $enable,
59-
hasstatus => true,
60-
require => Package[$package_name],
61-
}
34+
# This isn't a real service/daemon. The start action loads rules, so just
35+
# needs to be called on system boot.
36+
service { $service_name:
37+
ensure => undef,
38+
enable => $enable,
39+
hasstatus => true,
40+
require => Package[$package_name],
6241
}
6342
}

manifests/linux/redhat.pp

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,7 @@
4949
# RHEL 7 / CentOS 7 and later and Fedora 15 and later require the iptables-services
5050
# package, which provides the /usr/libexec/iptables/iptables.init used by
5151
# lib/puppet/util/firewall.rb.
52-
if ($::operatingsystem != 'Amazon')
53-
and (($::operatingsystem != 'Fedora' and versioncmp($::operatingsystemrelease, '7.0') >= 0)
54-
or ($::operatingsystem == 'Fedora' and versioncmp($::operatingsystemrelease, '15') >= 0)) {
52+
if ($::operatingsystem != 'Amazon') {
5553
if $firewalld_manage {
5654
service { 'firewalld':
5755
ensure => stopped,
@@ -74,9 +72,7 @@
7472
)
7573
}
7674

77-
if ($::operatingsystem != 'Amazon')
78-
and (($::operatingsystem != 'Fedora' and versioncmp($::operatingsystemrelease, '7.0') >= 0)
79-
or ($::operatingsystem == 'Fedora' and versioncmp($::operatingsystemrelease, '15') >= 0)) {
75+
if ($::operatingsystem != 'Amazon') {
8076
if $ensure == 'running' {
8177
exec { '/usr/bin/systemctl daemon-reload':
8278
require => Package[$package_name],
@@ -134,13 +130,6 @@
134130
}
135131
}
136132

137-
# Before puppet 4, the autobefore on the firewall type does not work - therefore
138-
# we need to keep this workaround here
139-
if versioncmp($::puppetversion, '4.0') <= 0 {
140-
File<| title == "/etc/sysconfig/${service_name}" |> -> Service<| title == $service_name |>
141-
File<| title == "/etc/sysconfig/${service_name_v6}" |> -> Service<| title == $service_name_v6 |>
142-
}
143-
144133
# Redhat 7 selinux user context for /etc/sysconfig/iptables is set to system_u
145134
# Redhat 7 selinux type context for /etc/sysconfig/iptables is set to system_conf_t
146135
case $::selinux {
@@ -149,11 +138,6 @@
149138
case $::operatingsystem {
150139
'CentOS': {
151140
case $::operatingsystemrelease {
152-
/^5\..*/: {
153-
$seluser = 'system_u'
154-
$seltype = 'etc_t'
155-
}
156-
157141
/^6\..*/: {
158142
$seluser = 'unconfined_u'
159143
$seltype = 'system_conf_t'

manifests/params.pp

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,6 @@
2121
if versioncmp($::operatingsystemrelease, '34') >= 0 {
2222
$package_name = 'iptables-services'
2323
$iptables_name = 'iptables-compat'
24-
} elsif versioncmp($::operatingsystemrelease, '15') >= 0 {
25-
$package_name = 'iptables-services'
26-
$iptables_name = 'iptables'
2724
} else {
2825
$iptables_name = 'iptables'
2926
$package_name = undef

spec/unit/classes/firewall_linux_debian_spec.rb

Lines changed: 8 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -3,52 +3,12 @@
33
require 'spec_helper'
44

55
describe 'firewall::linux::debian', type: :class do
6-
context 'with Debian 8' do
7-
let(:facts) do
8-
{
9-
osfamily: 'Debian',
10-
operatingsystem: 'Debian',
11-
operatingsystemrelease: 'jessie/sid',
12-
}
13-
end
14-
15-
it {
16-
is_expected.to contain_package('iptables-persistent').with(
17-
ensure: 'installed',
18-
)
19-
}
20-
it {
21-
is_expected.to contain_service('netfilter-persistent').with(
22-
ensure: nil,
23-
enable: 'true',
24-
require: 'Package[iptables-persistent]',
25-
)
26-
}
27-
end
28-
29-
context 'with deb8 enable => false' do
30-
let(:facts) do
31-
{
32-
osfamily: 'Debian',
33-
operatingsystem: 'Debian',
34-
operatingsystemrelease: 'jessie/sid',
35-
}
36-
end
37-
let(:params) { { enable: 'false' } }
38-
39-
it {
40-
is_expected.to contain_service('netfilter-persistent').with(
41-
enable: 'false',
42-
)
43-
}
44-
end
45-
46-
context 'with Debian 8, alt operatingsystem' do
6+
context 'with Debian 10' do
477
let(:facts) do
488
{
499
osfamily: 'Debian',
5010
operatingsystem: 'Debian',
51-
operatingsystemrelease: '8.0',
11+
operatingsystemrelease: '10.0',
5212
}
5313
end
5414

@@ -66,12 +26,12 @@
6626
}
6727
end
6828

69-
context 'with deb8, alt operatingsystem, enable => false' do
29+
context 'with Debian 10, enable => false' do
7030
let(:facts) do
7131
{
7232
osfamily: 'Debian',
7333
operatingsystem: 'Debian',
74-
operatingsystemrelease: '8.0',
34+
operatingsystemrelease: '10',
7535
}
7636
end
7737
let(:params) { { enable: 'false' } }
@@ -83,12 +43,12 @@
8343
}
8444
end
8545

86-
context 'with Debian 10' do
46+
context 'with Debian 11' do
8747
let(:facts) do
8848
{
8949
osfamily: 'Debian',
9050
operatingsystem: 'Debian',
91-
operatingsystemrelease: '10.0',
51+
operatingsystemrelease: '11.0',
9252
}
9353
end
9454

@@ -106,12 +66,12 @@
10666
}
10767
end
10868

109-
context 'with Debian 10, enable => false' do
69+
context 'with Debian 11, enable => false' do
11070
let(:facts) do
11171
{
11272
osfamily: 'Debian',
11373
operatingsystem: 'Debian',
114-
operatingsystemrelease: '10',
74+
operatingsystemrelease: '11',
11575
}
11676
end
11777
let(:params) { { enable: 'false' } }

spec/unit/classes/firewall_linux_redhat_spec.rb

Lines changed: 2 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -35,34 +35,10 @@
3535

3636
describe 'firewall::linux::redhat', type: :class do
3737
['RedHat', 'CentOS', 'Fedora', 'AlmaLinux'].each do |os|
38-
oldreleases = ((os == 'Fedora') ? ['14'] : ['6.5'])
39-
newreleases = ((os == 'Fedora') ? ['15', 'Rawhide'] : ['7.0.1406'])
38+
releases = ((os == 'Fedora') ? ['36'] : ['7.0.1406'])
4039
nftablesreleases = ((os == 'Fedora') ? [] : ['8.0'])
4140

42-
oldreleases.each do |osrel|
43-
context "os #{os} and osrel #{osrel}" do
44-
let(:facts) do
45-
{
46-
operatingsystem: os,
47-
operatingsystemrelease: osrel,
48-
osfamily: 'RedHat',
49-
selinux: false,
50-
puppetversion: Puppet.version,
51-
}
52-
end
53-
54-
it { is_expected.not_to contain_service('firewalld') }
55-
it { is_expected.not_to contain_package('iptables-services') }
56-
it {
57-
is_expected.to contain_file('/etc/sysconfig/iptables')
58-
is_expected.to contain_file('/etc/sysconfig/ip6tables')
59-
}
60-
61-
it_behaves_like 'ensures iptables service'
62-
end
63-
end
64-
65-
newreleases.each do |osrel|
41+
releases.each do |osrel|
6642
context "os #{os} and osrel #{osrel}" do
6743
let(:facts) do
6844
{

spec/unit/classes/firewall_linux_spec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
describe 'firewall::linux', type: :class do
66
['RedHat', 'CentOS'].each do |os|
77
context "Redhat Like: operatingsystem => #{os}" do
8-
releases = ['6', '7']
8+
releases = ['6', '7', '8']
99
releases.each do |osrel|
1010
context "operatingsystemrelease => #{osrel}" do
1111
let(:facts) do
@@ -28,7 +28,7 @@
2828

2929
['Debian', 'Ubuntu'].each do |os|
3030
context "Debian Like: operatingsystem => #{os}" do
31-
releases = ((os == 'Debian') ? ['10'] : ['20.04'])
31+
releases = ((os == 'Debian') ? ['10', '11'] : ['20.04', '22.04'])
3232
releases.each do |osrel|
3333
let(:facts) do
3434
{

spec/unit/puppet/provider/ip6tables_spec.rb

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,8 @@
22
# frozen_string_literal: true
33

44
require 'spec_helper'
5-
if Puppet::Util::Package.versioncmp(Puppet.version, '3.4.0') < 0
6-
require 'puppet/provider/confine/exists'
7-
else
8-
require 'puppet/confine/exists'
9-
end
5+
require 'puppet/confine/exists'
6+
107
provider_class = Puppet::Type.type(:firewall).provider(:ip6tables)
118
describe 'ip6tables' do
129
let(:params) { { name: '000 test foo', action: 'accept' } }

spec/unit/puppet/provider/iptables_chain_spec.rb

Lines changed: 3 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,22 +2,12 @@
22
# frozen_string_literal: true
33

44
require 'spec_helper'
5-
if Puppet::Util::Package.versioncmp(Puppet.version, '3.4.0') < 0
6-
require 'puppet/provider/confine/exists'
7-
else
8-
require 'puppet/confine/exists'
9-
end
5+
require 'puppet/confine/exists'
106

117
describe 'iptables chain' do
128
describe 'iptables chain provider detection' do
13-
if Puppet::Util::Package.versioncmp(Puppet.version, '3.4.0') < 0
14-
let(:exists) do
15-
Puppet::Provider::Confine::Exists
16-
end
17-
else
18-
let(:exists) do
19-
Puppet::Confine::Exists
20-
end
9+
let(:exists) do
10+
Puppet::Confine::Exists
2111
end
2212

2313
before :each do

0 commit comments

Comments
 (0)