Skip to content

Commit 9a7de7f

Browse files
authored
Merge pull request #1110 from puppetlabs/CONT-352-Syntax_update
(CONT-352) Syntax update
2 parents 607fae1 + 7b13948 commit 9a7de7f

15 files changed

+147
-131
lines changed

.puppet-lint.rc

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1 @@
11
--relative
2-
--no-relative_classname_inclusion-check
3-
--no-parameter_types-check
4-
--no-top_scope_facts-check
5-
--no-legacy_facts-check

.sync.yml

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,3 @@ spec/spec_helper.rb:
3232
.travis.yml:
3333
delete: true
3434
changelog_since_tag: 'v3.0.0'
35-
Rakefile:
36-
extra_disabled_lint_checks:
37-
- relative_classname_inclusion
38-
- parameter_types
39-
- top_scope_facts
40-
- legacy_facts

Rakefile

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,6 @@ def changelog_future_release
4242
end
4343

4444
PuppetLint.configuration.send('disable_relative')
45-
PuppetLint.configuration.send('disable_relative_classname_inclusion')
46-
PuppetLint.configuration.send('disable_parameter_types')
47-
PuppetLint.configuration.send('disable_top_scope_facts')
48-
PuppetLint.configuration.send('disable_legacy_facts')
4945

5046

5147
if Bundler.rubygems.find_name('github_changelog_generator').any?

manifests/init.pp

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
# Controls the state of the ipv6 iptables service on your system. Valid options: 'running' or 'stopped'.
1717
#
1818
# @param pkg_ensure
19-
# Controls the state of the iptables package on your system. Valid options: 'present' or 'latest'.
19+
# Controls the state of the iptables package on your system. Valid options: 'present', 'installed' or 'latest'.
2020
#
2121
# @param service_name
2222
# Specify the name of the IPv4 iptables service.
@@ -31,14 +31,14 @@
3131
# Controls whether puppet manages the ebtables package or not. If managed, the package will use the value of pkg_ensure.
3232
#
3333
class firewall (
34-
$ensure = running,
35-
$ensure_v6 = undef,
36-
$pkg_ensure = present,
37-
$service_name = $firewall::params::service_name,
38-
$service_name_v6 = $firewall::params::service_name_v6,
39-
$package_name = $firewall::params::package_name,
40-
$ebtables_manage = false,
41-
) inherits ::firewall::params {
34+
Enum[running, stopped, 'running', 'stopped'] $ensure = running,
35+
Optional[Enum[running, stopped, 'running', 'stopped']] $ensure_v6 = undef,
36+
Enum[present, installed, latest, 'present', 'installed', 'latest'] $pkg_ensure = present,
37+
Variant[String[1], Array[String[1]]] $service_name = $firewall::params::service_name,
38+
Optional[String[1]] $service_name_v6 = $firewall::params::service_name_v6,
39+
Optional[Variant[String[1], Array[String[1]]]] $package_name = $firewall::params::package_name,
40+
Boolean $ebtables_manage = false,
41+
) inherits firewall::params {
4242
$_ensure_v6 = pick($ensure_v6, $ensure)
4343

4444
case $ensure {
@@ -61,7 +61,7 @@
6161
}
6262
}
6363

64-
case $::kernel {
64+
case $facts['kernel'] {
6565
'Linux': {
6666
class { "${title}::linux":
6767
ensure => $ensure,
@@ -77,7 +77,7 @@
7777
'FreeBSD', 'windows': {
7878
}
7979
default: {
80-
fail("${title}: Kernel '${::kernel}' is not currently supported")
80+
fail("${title}: Kernel '${facts['kernel']}' is not currently supported")
8181
}
8282
}
8383
}

manifests/linux.pp

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# Controls the state of the ipv6 iptables service on your system. Valid options: 'running' or 'stopped'. Defaults to 'running'.
88
#
99
# @param pkg_ensure
10-
# Controls the state of the iptables package on your system. Valid options: 'installed' or 'latest'. Defaults to 'latest'.
10+
# Controls the state of the iptables package on your system. Valid options: 'present', 'installed' or 'latest'. Defaults to 'latest'.
1111
#
1212
# @param service_name
1313
# Specify the name of the IPv4 iptables service. Defaults defined in firewall::params.
@@ -24,15 +24,15 @@
2424
# @api private
2525
#
2626
class firewall::linux (
27-
$ensure = running,
28-
$ensure_v6 = undef,
29-
$pkg_ensure = installed,
30-
$service_name = $firewall::params::service_name,
31-
$service_name_v6 = $firewall::params::service_name_v6,
32-
$package_name = $firewall::params::package_name,
33-
$ebtables_manage = false,
34-
$iptables_name = $firewall::params::iptables_name,
35-
) inherits ::firewall::params {
27+
Enum[running, stopped, 'running', 'stopped'] $ensure = running,
28+
Optional[Enum[running, stopped, 'running', 'stopped']] $ensure_v6 = undef,
29+
Enum[present, installed, latest, 'present', 'installed', 'latest'] $pkg_ensure = installed,
30+
Variant[String[1], Array[String[1]]] $service_name = $firewall::params::service_name,
31+
Optional[String[1]] $service_name_v6 = $firewall::params::service_name_v6,
32+
Optional[Variant[String[1], Array[String[1]]]] $package_name = $firewall::params::package_name,
33+
Boolean $ebtables_manage = false,
34+
String[1] $iptables_name = $firewall::params::iptables_name,
35+
) inherits firewall::params {
3636
$enable = $ensure ? {
3737
'running' => true,
3838
'stopped' => false,
@@ -56,7 +56,7 @@
5656
}
5757
}
5858

59-
case $::operatingsystem {
59+
case $facts['os']['name'] {
6060
'RedHat', 'CentOS', 'Fedora', 'Scientific', 'SL', 'SLC', 'Ascendos',
6161
'CloudLinux', 'PSBM', 'OracleLinux', 'OVS', 'OEL', 'Amazon', 'XenServer',
6262
'VirtuozzoLinux', 'Rocky', 'AlmaLinux': {

manifests/linux/archlinux.pp

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@
1919
# @api private
2020
#
2121
class firewall::linux::archlinux (
22-
$ensure = 'running',
23-
$enable = true,
24-
$service_name = $firewall::params::service_name,
25-
$package_name = $firewall::params::package_name,
26-
$package_ensure = $firewall::params::package_ensure,
27-
) inherits ::firewall::params {
22+
Enum[running, stopped, 'running', 'stopped'] $ensure = 'running',
23+
Variant[Boolean, String[1]] $enable = true,
24+
Variant[String[1], Array[String[1]]] $service_name = $firewall::params::service_name,
25+
Optional[Variant[String[1], Array[String[1]]]] $package_name = $firewall::params::package_name,
26+
Enum[present, latest, 'present', 'latest'] $package_ensure = $firewall::params::package_ensure,
27+
) inherits firewall::params {
2828
if $package_name {
2929
package { $package_name:
3030
ensure => $package_ensure,

manifests/linux/debian.pp

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@
1919
# @api private
2020
#
2121
class firewall::linux::debian (
22-
$ensure = running,
23-
$enable = true,
24-
$service_name = $firewall::params::service_name,
25-
$package_name = $firewall::params::package_name,
26-
$package_ensure = $firewall::params::package_ensure,
27-
) inherits ::firewall::params {
22+
Enum[running, stopped, 'running', 'stopped'] $ensure = running,
23+
Variant[Boolean, String[1]] $enable = true,
24+
Variant[String[1], Array[String[1]]] $service_name = $firewall::params::service_name,
25+
Optional[Variant[String[1], Array[String[1]]]] $package_name = $firewall::params::package_name,
26+
Enum[present, latest, 'present', 'latest'] $package_ensure = $firewall::params::package_ensure,
27+
) inherits firewall::params {
2828
if $package_name {
2929
ensure_packages([$package_name], {
3030
ensure => $package_ensure

manifests/linux/gentoo.pp

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@
1919
# @api private
2020
#
2121
class firewall::linux::gentoo (
22-
$ensure = 'running',
23-
$enable = true,
24-
$service_name = $firewall::params::service_name,
25-
$package_name = $firewall::params::package_name,
26-
$package_ensure = $firewall::params::package_ensure,
27-
) inherits ::firewall::params {
22+
Enum[running, stopped, 'running', 'stopped'] $ensure = running,
23+
Variant[Boolean, String[1]] $enable = true,
24+
Variant[String[1], Array[String[1]]] $service_name = $firewall::params::service_name,
25+
Optional[Variant[String[1], Array[String[1]]]] $package_name = $firewall::params::package_name,
26+
Enum[present, latest, 'present', 'latest'] $package_ensure = $firewall::params::package_ensure,
27+
) inherits firewall::params {
2828
if $package_name {
2929
package { $package_name:
3030
ensure => $package_ensure,

manifests/linux/redhat.pp

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -32,24 +32,24 @@
3232
# @api private
3333
#
3434
class firewall::linux::redhat (
35-
$ensure = running,
36-
$ensure_v6 = undef,
37-
$enable = true,
38-
$enable_v6 = undef,
39-
$service_name = $firewall::params::service_name,
40-
$service_name_v6 = $firewall::params::service_name_v6,
41-
$package_name = $firewall::params::package_name,
42-
$package_ensure = $firewall::params::package_ensure,
43-
$sysconfig_manage = $firewall::params::sysconfig_manage,
44-
$firewalld_manage = $firewall::params::firewalld_manage,
45-
) inherits ::firewall::params {
35+
Enum[running, stopped, 'running', 'stopped'] $ensure = running,
36+
Optional[Enum[running, stopped, 'running', 'stopped']] $ensure_v6 = undef,
37+
Variant[Boolean, String[1]] $enable = true,
38+
Optional[Variant[Boolean, String[1]]] $enable_v6 = undef,
39+
Variant[String[1], Array[String[1]]] $service_name = $firewall::params::service_name,
40+
Optional[String[1]] $service_name_v6 = $firewall::params::service_name_v6,
41+
Optional[Variant[String[1], Array[String[1]]]] $package_name = $firewall::params::package_name,
42+
Enum[present, latest, 'present', 'latest'] $package_ensure = $firewall::params::package_ensure,
43+
Boolean $sysconfig_manage = $firewall::params::sysconfig_manage,
44+
Boolean $firewalld_manage = $firewall::params::firewalld_manage,
45+
) inherits firewall::params {
4646
$_ensure_v6 = pick($ensure_v6, $ensure)
4747
$_enable_v6 = pick($enable_v6, $enable)
4848

4949
# RHEL 7 / CentOS 7 and later and Fedora 15 and later require the iptables-services
5050
# package, which provides the /usr/libexec/iptables/iptables.init used by
5151
# lib/puppet/util/firewall.rb.
52-
if ($::operatingsystem != 'Amazon') {
52+
if ($facts['os']['name'] != 'Amazon') {
5353
if $firewalld_manage {
5454
service { 'firewalld':
5555
ensure => stopped,
@@ -72,7 +72,7 @@
7272
)
7373
}
7474

75-
if ($::operatingsystem != 'Amazon') {
75+
if ($facts['os']['name'] != 'Amazon') {
7676
if $ensure == 'running' {
7777
$running_command = ['/usr/bin/systemctl', 'daemon-reload']
7878

@@ -86,8 +86,8 @@
8686
}
8787
}
8888

89-
if ($::operatingsystem == 'Amazon') and (versioncmp($::operatingsystemmajrelease, '4') >= 0)
90-
or ($::operatingsystem == 'Amazon') and (versioncmp($::operatingsystemmajrelease, '2') >= 0) {
89+
if ($facts['os']['name'] == 'Amazon') and (versioncmp($facts['os']['release']['major'], '4') >= 0)
90+
or ($facts['os']['name'] == 'Amazon') and (versioncmp($facts['os']['release']['major'], '2') >= 0) {
9191
service { $service_name:
9292
ensure => $ensure,
9393
enable => $enable,
@@ -135,12 +135,12 @@
135135

136136
# Redhat 7 selinux user context for /etc/sysconfig/iptables is set to system_u
137137
# Redhat 7 selinux type context for /etc/sysconfig/iptables is set to system_conf_t
138-
case $::selinux {
138+
case $facts['os']['selinux']['enabled'] {
139139
#lint:ignore:quoted_booleans
140140
'true',true: {
141-
case $::operatingsystem {
141+
case $facts['os']['name'] {
142142
'CentOS': {
143-
case $::operatingsystemrelease {
143+
case $facts['os']['release']['full'] {
144144
/^6\..*/: {
145145
$seluser = 'unconfined_u'
146146
$seltype = 'system_conf_t'

manifests/params.pp

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@
44
#
55
class firewall::params {
66
$package_ensure = 'present'
7-
case $::osfamily {
7+
case $facts['os']['family'] {
88
'RedHat': {
9-
case $::operatingsystem {
9+
case $facts['os']['name'] {
1010
'Amazon': {
1111
$service_name = 'iptables'
1212
$service_name_v6 = 'ip6tables'
@@ -18,7 +18,7 @@
1818
'Fedora': {
1919
$service_name = 'iptables'
2020
$service_name_v6 = 'ip6tables'
21-
if versioncmp($::operatingsystemrelease, '34') >= 0 {
21+
if versioncmp($facts['os']['release']['full'], '34') >= 0 {
2222
$package_name = 'iptables-services'
2323
$iptables_name = 'iptables-compat'
2424
} else {
@@ -29,21 +29,21 @@
2929
$firewalld_manage = true
3030
}
3131
default: {
32-
if versioncmp($::operatingsystemrelease, '9') >= 0 {
32+
if versioncmp($facts['os']['release']['full'], '9') >= 0 {
3333
$service_name = ['nftables','iptables']
3434
$service_name_v6 = 'ip6tables'
3535
$package_name = ['iptables-services', 'nftables', 'iptables-nft-services']
3636
$iptables_name = 'iptables-nft'
3737
$sysconfig_manage = false
3838
$firewalld_manage = false
39-
} elsif versioncmp($::operatingsystemrelease, '8.0') >= 0 {
39+
} elsif versioncmp($facts['os']['release']['full'], '8.0') >= 0 {
4040
$service_name = ['iptables', 'nftables']
4141
$service_name_v6 = 'ip6tables'
4242
$package_name = ['iptables-services', 'nftables']
4343
$iptables_name = 'iptables'
4444
$sysconfig_manage = false
4545
$firewalld_manage = true
46-
} elsif versioncmp($::operatingsystemrelease, '7.0') >= 0 {
46+
} elsif versioncmp($facts['os']['release']['full'], '7.0') >= 0 {
4747
$service_name = 'iptables'
4848
$service_name_v6 = 'ip6tables'
4949
$package_name = 'iptables-services'
@@ -64,12 +64,12 @@
6464
'Debian': {
6565
$service_name_v6 = undef
6666
$iptables_name = 'iptables'
67-
case $::operatingsystem {
67+
case $facts['os']['name'] {
6868
'Debian': {
69-
if versioncmp($::operatingsystemrelease, 'unstable') >= 0 {
69+
if versioncmp($facts['os']['release']['full'], 'unstable') >= 0 {
7070
$service_name = 'netfilter-persistent'
7171
$package_name = 'netfilter-persistent'
72-
} elsif versioncmp($::operatingsystemrelease, '8.0') >= 0 {
72+
} elsif versioncmp($facts['os']['release']['full'], '8.0') >= 0 {
7373
$service_name = 'netfilter-persistent'
7474
$package_name = 'iptables-persistent'
7575
} else {
@@ -78,7 +78,7 @@
7878
}
7979
}
8080
'Ubuntu': {
81-
if versioncmp($::operatingsystemrelease, '14.10') >= 0 {
81+
if versioncmp($facts['os']['release']['full'], '14.10') >= 0 {
8282
$service_name = 'netfilter-persistent'
8383
$package_name = 'iptables-persistent'
8484
} else {
@@ -100,7 +100,7 @@
100100
default: {
101101
$iptables_name = 'iptables'
102102
$service_name_v6 = undef
103-
case $::operatingsystem {
103+
case $facts['os']['name'] {
104104
'Archlinux': {
105105
$service_name = ['iptables','ip6tables']
106106
$package_name = undef

0 commit comments

Comments
 (0)