Skip to content

Commit

Permalink
Revert "upgrade puppet modules"
Browse files Browse the repository at this point in the history
  • Loading branch information
rrotter authored May 7, 2024
1 parent eef4298 commit 4061d98
Show file tree
Hide file tree
Showing 36 changed files with 118 additions and 221 deletions.
53 changes: 27 additions & 26 deletions .fixtures.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,29 +16,30 @@ fixtures:
apache:
repo: "https://github.com/mlibrary/puppetlabs-apache"
forge_modules:
rbenv: {"repo": "jdowning/rbenv", "ref": "3.0.0" }
archive: {"repo": "puppet/archive", "ref": "7.1.0" }
kmod: {"repo": "puppet/kmod", "ref": "4.0.1" }
letsencrypt: {"repo": "puppet/letsencrypt", "ref": "11.0.0"}
logrotate: {"repo": "puppet/logrotate", "ref": "7.0.2" }
nginx: {"repo": "puppet/nginx", "ref": "5.0.0" }
php: {"repo": "puppet/php", "ref": "10.1.0"}
unattended_upgrades: {"repo": "puppet/unattended_upgrades", "ref": "8.1.0" }
apt: {"repo": "puppetlabs/apt", "ref": "9.4.0" }
augeas_core: {"repo": "puppetlabs/augeas_core", "ref": "1.5.0" }
concat: {"repo": "puppetlabs/concat", "ref": "9.0.2" }
cron_core: {"repo": "puppetlabs/cron_core", "ref": "1.3.0" }
docker: {"repo": "puppetlabs/docker", "ref": "9.1.0" }
firewall: {"repo": "puppetlabs/firewall", "ref": "8.0.1" }
host_core: {"repo": "puppetlabs/host_core", "ref": "1.3.0" }
inifile: {"repo": "puppetlabs/inifile", "ref": "6.1.1" }
lvm: {"repo": "puppetlabs/lvm", "ref": "2.1.0" }
mount_core: {"repo": "puppetlabs/mount_core", "ref": "1.3.0" }
mysql: {"repo": "puppetlabs/mysql", "ref": "15.0.0"}
ntp: {"repo": "puppetlabs/ntp", "ref": "10.1.0"}
postgresql: {"repo": "puppetlabs/postgresql", "ref": "10.2.0"}
puppetdb: {"repo": "puppetlabs/puppetdb", "ref": "8.0.1" }
reboot: {"repo": "puppetlabs/reboot", "ref": "5.0.0" }
sshkeys_core: {"repo": "puppetlabs/sshkeys_core", "ref": "2.5.0" }
stdlib: {"repo": "puppetlabs/stdlib", "ref": "9.6.0" }
debconf: {"repo": "stm/debconf", "ref": "6.0.0" }
rbenv: {"repo": "jdowning/rbenv", "ref": "3.0.0"}
archive: {"repo": "puppet/archive", "ref": "7.0.0"}
kmod: {"repo": "puppet/kmod", "ref": "4.0.0"}
letsencrypt: {"repo": "puppet/letsencrypt", "ref": "10.1.0"}
logrotate: {"repo": "puppet/logrotate", "ref": "7.0.1"} # 7.0.2 updates systemd, conflicts with postgres
nginx: {"repo": "puppet/nginx", "ref": "5.0.0"}
php: {"repo": "puppet/php", "ref": "9.0.0"}
apt: {"repo": "puppetlabs/apt", "ref": "9.0.0"} # 9.0.1+ breaks, needs updated stdlib
augeas_core: {"repo": "puppetlabs/augeas_core", "ref": "1.4.0"}
concat: {"repo": "puppetlabs/concat", "ref": "7.4.0"} # held back by postgres (and in turn by puppetdb v7.13)
cron_core: {"repo": "puppetlabs/cron_core", "ref": "1.2.0"}
docker: {"repo": "puppetlabs/docker", "ref": "7.0.0"} # 8.0.0 breaks
firewall: {"repo": "puppetlabs/firewall", "ref": "3.6.0"} # 5 breaks puppetdb v7.13, 6.0.0 needs stdlib 9, 7.0.0 breaks tests
host_core: {"repo": "puppetlabs/host_core", "ref": "1.2.0"}
inifile: {"repo": "puppetlabs/inifile", "ref": "5.4.1"} # held back by puppetdb v7.13
lvm: {"repo": "puppetlabs/lvm", "ref": "2.0.3"}
mount_core: {"repo": "puppetlabs/mount_core", "ref": "1.2.0"}
mysql: {"repo": "puppetlabs/mysql", "ref": "14.0.0"} # 15.0.0 breaks
ntp: {"repo": "puppetlabs/ntp", "ref": "10.1.0"}
postgresql: {"repo": "puppetlabs/postgresql", "ref": "8.3.0"} # 9.x blocked on puppetdb v7.13, blocks Puppet 8!?
puppetdb: {"repo": "puppetlabs/puppetdb", "ref": "7.13.0"}
reboot: {"repo": "puppetlabs/reboot", "ref": "5.0.0"}
sshkeys_core: {"repo": "puppetlabs/sshkeys_core", "ref": "2.4.0"}
stdlib: {"repo": "puppetlabs/stdlib", "ref": "8.6.0"} # ?! dragons...
resolv_conf: {"repo": "saz/resolv_conf", "ref": "5.1.0"}
debconf: {"repo": "stm/debconf", "ref": "6.0.0"}
unattended_upgrades: {"repo": "puppet/unattended_upgrades", "ref": "8.0.0"}
2 changes: 1 addition & 1 deletion manifests/exposed_port.pp
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@
dport => $port,
source => $cidr['block'],
state => 'NEW',
jump => 'accept',
action => 'accept',
}
}
}
2 changes: 1 addition & 1 deletion manifests/firewall_allow.pp
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@
dport => $port,
source => $cidr,
state => 'NEW',
jump => 'accept',
action => 'accept',
}
}
}
2 changes: 1 addition & 1 deletion manifests/profile/dns/smartconnect.pp
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@
$nameservers = $other_ns_ips
}

class { 'nebula::resolv_conf':
class { 'resolv_conf':
nameservers => concat(['127.0.0.1'], $nameservers),
searchpath => lookup('nebula::resolv_conf::searchpath'),
require => Service['bind9']
Expand Down
5 changes: 4 additions & 1 deletion manifests/profile/dns/standard.pp
Original file line number Diff line number Diff line change
Expand Up @@ -9,5 +9,8 @@
# @example
# include nebula::profile::dns::standard
class nebula::profile::dns::standard {
include nebula::resolv_conf
class { 'resolv_conf':
nameservers => lookup('nebula::resolv_conf::nameservers'),
searchpath => lookup('nebula::resolv_conf::searchpath'),
}
}
2 changes: 1 addition & 1 deletion manifests/profile/fulcrum/nginx.pp
Original file line number Diff line number Diff line change
Expand Up @@ -197,6 +197,6 @@
proto => 'tcp',
dport => 443,
state => 'NEW',
jump => 'accept',
action => 'accept',
}
}
4 changes: 2 additions & 2 deletions manifests/profile/haproxy.pp
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@
}

$services.filter |$service, $params| {
'floating_ip' in $params
$params.has_key('floating_ip')
}.each |$service, $params| {
@nebula::haproxy::service { $service :
cert_source => $cert_source,
Expand Down Expand Up @@ -133,7 +133,7 @@
dport => [80, 443],
source => $::ipaddress,
state => 'NEW',
jump => 'accept',
action => 'accept',
tag => 'haproxy'
}

Expand Down
2 changes: 1 addition & 1 deletion manifests/profile/hathitrust/rsync.pp
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@
dport => 873,
source => $user['ip'],
state => 'NEW',
jump => 'accept'
action => 'accept'
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion manifests/profile/hathitrust/secure_rsync.pp
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@
source => $network['block'],
src_range => $network['range'],
state => 'NEW',
jump => 'accept',
action => 'accept',
}
}
}
2 changes: 1 addition & 1 deletion manifests/profile/kubernetes/dns_server.pp
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@
dport => 53,
source => $node_cidr,
state => 'NEW',
jump => 'accept',
action => 'accept',
;

'200 Nameserver (TCP)':
Expand Down
2 changes: 1 addition & 1 deletion manifests/profile/kubernetes/haproxy.pp
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@
default:
proto => 'tcp',
state => 'NEW',
jump => 'accept',
action => 'accept',
;

'200 private api':
Expand Down
2 changes: 1 addition & 1 deletion manifests/profile/kubernetes/kubelet.pp
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@
proto => 'tcp',
source => $node_cidr,
state => 'NEW',
jump => 'accept',
action => 'accept',
;

'200 Cluster ssh':
Expand Down
2 changes: 1 addition & 1 deletion manifests/profile/kubernetes/router.pp
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@
firewall { '001 Do not NAT internal requests':
table => 'nat',
chain => 'POSTROUTING',
jump => 'accept',
action => 'accept',
proto => 'all',
source => $node_cidr,
destination => $node_cidr,
Expand Down
2 changes: 1 addition & 1 deletion manifests/profile/letsencrypt.pp
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,6 @@
proto => 'tcp',
dport => 80,
state => 'NEW',
jump => 'accept',
action => 'accept',
}
}
20 changes: 10 additions & 10 deletions manifests/profile/networking/firewall.pp
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@
$firewall_defaults = {
proto => 'tcp',
state => 'NEW',
jump => 'accept'
action => 'accept'
}

create_resources(firewall,$rules,$firewall_defaults)
Expand All @@ -148,41 +148,41 @@
firewall { '001 accept related established rules':
proto => 'all',
state => ['RELATED', 'ESTABLISHED'],
jump => 'accept',
action => 'accept',
}

firewall { '001 accept all to lo interface':
proto => 'all',
iniface => 'lo',
jump => 'accept',
action => 'accept',
}

firewall { '999 drop all':
proto => 'all',
jump => 'drop',
action => 'drop',
before => undef,
}

# Default IPv6 items, sorted by title
firewall { '001 accept related established rules (v6)':
proto => 'all',
state => ['RELATED', 'ESTABLISHED'],
jump => 'accept',
protocol => 'ip6tables',
action => 'accept',
provider => 'ip6tables',
}

firewall { '001 accept all to lo interface (v6)':
proto => 'all',
iniface => 'lo',
jump => 'accept',
protocol => 'ip6tables',
action => 'accept',
provider => 'ip6tables',
}

firewall { '999 drop all (v6)':
proto => 'all',
jump => 'drop',
action => 'drop',
before => undef,
protocol => 'ip6tables',
provider => 'ip6tables',
}

}
2 changes: 1 addition & 1 deletion manifests/profile/networking/firewall/http_datacenters.pp
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
proto => 'tcp',
dport => [80, 443],
state => 'NEW',
jump => 'accept'
action => 'accept'
}

$networks.flatten.each |$network| {
Expand Down
10 changes: 5 additions & 5 deletions manifests/profile/prometheus.pp
Original file line number Diff line number Diff line change
Expand Up @@ -153,7 +153,7 @@
dport => 9100,
source => $::ipaddress,
state => 'NEW',
jump => 'accept',
action => 'accept',
}

case $facts["mlibrary_ip_addresses"] {
Expand Down Expand Up @@ -194,7 +194,7 @@
proto => 'tcp',
source => $address,
state => 'NEW',
jump => 'accept',
action => 'accept',
;

"010 prometheus public node exporter ${::hostname} ${address}":
Expand All @@ -215,7 +215,7 @@
proto => 'tcp',
source => $address,
state => 'NEW',
jump => 'accept',
action => 'accept',
;

"010 prometheus private node exporter ${::hostname} ${address}":
Expand All @@ -236,7 +236,7 @@
dport => 9101,
source => $::ipaddress,
state => 'NEW',
jump => 'accept',
action => 'accept',
}

@@firewall { "010 prometheus mysql exporter ${::hostname}":
Expand All @@ -245,7 +245,7 @@
dport => 9104,
source => $::ipaddress,
state => 'NEW',
jump => 'accept',
action => 'accept',
}

Firewall <<| tag == "${::datacenter}_pushgateway_node" |>>
Expand Down
2 changes: 1 addition & 1 deletion manifests/profile/prometheus/exporter/node.pp
Original file line number Diff line number Diff line change
Expand Up @@ -154,7 +154,7 @@
dport => 9091,
source => $address,
state => 'NEW',
jump => 'accept',
action => 'accept',
}
}

Expand Down
17 changes: 0 additions & 17 deletions manifests/resolv_conf.pp

This file was deleted.

2 changes: 1 addition & 1 deletion manifests/role/webhost/htvm/test.pp
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@
dport => [80,443],
source => $network['block'],
state => 'NEW',
jump => 'accept',
action => 'accept',
}
}

Expand Down
2 changes: 1 addition & 1 deletion manifests/unison/client.pp
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@
dport => [$port],
source => $::ipaddress,
state => 'NEW',
jump => 'accept',
action => 'accept',
tag => "unison-client-${title}"
}

Expand Down
Loading

0 comments on commit 4061d98

Please sign in to comment.