From: George Cox Date: Tue, 6 Nov 2018 09:50:10 +0000 (+0000) Subject: Changed regex for iniface and outiface to allow '@' in interface names X-Git-Tag: 1.15.0~13^2 X-Git-Url: https://review.fuel-infra.org/gitweb?a=commitdiff_plain;h=1fe8683ed7180dc2740beb4f9cfca6a62a0447fa;p=puppet-modules%2Fpuppetlabs-firewall.git Changed regex for iniface and outiface to allow '@' in interface names --- diff --git a/README.markdown b/README.markdown index 8f5168f..3127845 100644 --- a/README.markdown +++ b/README.markdown @@ -627,7 +627,7 @@ If Puppet is managing the iptables or iptables-persistent packages, and the prov * `icmp`: When matching ICMP packets, this indicates the type of ICMP packet to match. A value of 'any' is not supported. To match any type of ICMP packet, the parameter should be omitted or undefined. Requires the `icmp_match` feature. This parameter is supported by firewall_multi (see below). -* `iniface`: Input interface to filter on. Values must match '/^!?\s?[a-zA-Z0-9\-\._\+\:]+$/'. Requires the `interface_match` feature. Supports interface alias (eth0:0) and negation. +* `iniface`: Input interface to filter on. Values must match '/^!?\s?[a-zA-Z0-9\-\._\+\:@]+$/'. Requires the `interface_match` feature. Supports interface alias (eth0:0) and negation. * `ipsec_dir`: Sets the ipsec policy direction. Valid values are 'in', 'out'. Requires the `ipsec_dir` feature. @@ -692,7 +692,7 @@ If Puppet is managing the iptables or iptables-persistent packages, and the prov Depending on the provider, the name of the rule can be stored using the comment feature of the underlying firewall subsystem. Values must match '/^\d+[[:graph:][:space:]]+$/'. -* `outiface`: Output interface to filter on. Values must match '/^!?\s?[a-zA-Z0-9\-\._\+\:]+$/'. Requires the `interface_match` feature. Supports interface alias (eth0:0) and negation. +* `outiface`: Output interface to filter on. Values must match '/^!?\s?[a-zA-Z0-9\-\._\+\:@]+$/'. Requires the `interface_match` feature. Supports interface alias (eth0:0) and negation. * `physdev_in`: Match if the packet is entering a bridge from the given interface. Values must match '/^[a-zA-Z0-9\-\._\+]+$/'. diff --git a/lib/puppet/type/firewall.rb b/lib/puppet/type/firewall.rb index 55e6502..a556136 100644 --- a/lib/puppet/type/firewall.rb +++ b/lib/puppet/type/firewall.rb @@ -540,7 +540,7 @@ Puppet::Type.newtype(:firewall) do iniface => '! lo', PUPPETCODE - newvalues(%r{^!?\s?[a-zA-Z0-9\-\._\+\:]+$}) + newvalues(%r{^!?\s?[a-zA-Z0-9\-\._\+\:@]+$}) end newproperty(:outiface, required_features: :interface_match) do @@ -551,7 +551,7 @@ Puppet::Type.newtype(:firewall) do outiface => '! lo', PUPPETCODE - newvalues(%r{^!?\s?[a-zA-Z0-9\-\._\+\:]+$}) + newvalues(%r{^!?\s?[a-zA-Z0-9\-\._\+\:@]+$}) end # NAT specific properties