diff --git a/doc/puppet_classes/confdroid_ssh_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_ssh_3A_3Afirewall_3A_3Aiptables.html index 72537f1..935ccb0 100644 --- a/doc/puppet_classes/confdroid_ssh_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_ssh_3A_3Afirewall_3A_3Aiptables.html @@ -120,9 +120,7 @@ 22 23 24 -25 -26 -27 +25
# File 'manifests/firewall/iptables.pp', line 6
@@ -130,23 +128,21 @@
class confdroid_ssh::firewall::iptables (
) inherits confdroid_ssh::params {
- if $ssh_use_firewall == true {
- firewall { "${ssh_fw_order}${ssh_fw_port} allow SSH on port ${ssh_fw_port}":
- ensure => 'present',
- proto => 'tcp',
- source => $ssh_source_range,
- dport => $ssh_fw_port,
- jump => 'accept',
+ case $ssh_use_firewall {
+ true, 'true', 'yes', '1': {
+ $ssh_fw_ensure = 'present'
+ }
+ default: {
+ $ssh_fw_ensure = 'absent'
}
}
- if $ssh_use_firewall == false {
- firewall { "${ssh_fw_order}${ssh_fw_port} remove SSH on port ${ssh_fw_port}":
- ensure => 'absent',
- proto => 'tcp',
- source => $ssh_source_range,
- dport => $ssh_fw_port,
- jump => 'accept',
- }
+
+ firewall { "${ssh_fw_order}${ssh_fw_port} allow SSH on port ${ssh_fw_port}":
+ ensure => $ssh_fw_ensure,
+ proto => 'tcp',
+ source => $ssh_source_range,
+ dport => $ssh_fw_port,
+ jump => 'accept',
}
}