]> review.fuel-infra Code Review - puppet-modules/puppetlabs-firewall.git/log
puppet-modules/puppetlabs-firewall.git
12 years ago(#16004) array_matching is contraindicated.
Sharif Nassar [Fri, 16 Nov 2012 20:49:18 +0000 (12:49 -0800)]
(#16004) array_matching is contraindicated.

With ":array_matching =>:all", uid/gid rules are reloaded with every
Puppet run.  This is ugly and annoying, and arguably wrong.

12 years agoMerge pull request #91 from saysjonathan/rspec_new_api
Ken Barber [Fri, 27 Jul 2012 19:59:44 +0000 (12:59 -0700)]
Merge pull request #91 from saysjonathan/rspec_new_api

rspec 2.11 compatibility

12 years agorspec 2.11 compatibility
Jonathan Boyett [Fri, 27 Jul 2012 17:54:02 +0000 (10:54 -0700)]
rspec 2.11 compatibility

12 years agoMerge pull request #89 from kbarber/ticket/master/10322-error_with_same_chain_diff_table
Dan Carley [Wed, 25 Jul 2012 08:56:28 +0000 (01:56 -0700)]
Merge pull request #89 from kbarber/ticket/master/10322-error_with_same_chain_diff_table

(#10322) Insert order hash included chains from different tables

12 years ago(#10322) Insert order hash included chains from different tables
Ken Barber [Tue, 24 Jul 2012 19:29:54 +0000 (20:29 +0100)]
(#10322) Insert order hash included chains from different tables

This fix corrects the insert_order handling to make sure that not only are
rules from the same chain evaulated, but we also check that the table
matches as well.

12 years agoMerge pull request #87 from dcarley/15556-icmp6_codes
Ken Barber [Tue, 17 Jul 2012 12:23:39 +0000 (05:23 -0700)]
Merge pull request #87 from dcarley/15556-icmp6_codes

(#15556) Support for ICMP6 type code resolutions

12 years ago(#15556) Support for ICMP6 type code resolutions
Dan Carley [Fri, 6 Jul 2012 07:22:32 +0000 (08:22 +0100)]
(#15556) Support for ICMP6 type code resolutions

Add support for IPv6 ICMP code types as strings, which differ in mapping
from IPv4. A subset of the currently supported strings for IPv4 are
supported where applicable to the IPv6 specification.

Currently the only way of determining the protocol family is by whether the
provider is :iptables or :ip6tables. This can be changed within the type in
the future.

12 years agoMerge pull request #86 from Whopper92/readme_best_practices
Ken Barber [Thu, 28 Jun 2012 22:32:55 +0000 (15:32 -0700)]
Merge pull request #86 from Whopper92/readme_best_practices

Update formatting of README to meet Puppet Labs best practices

12 years agoUpdate formatting of README to meet Puppet Labs best practices
Will Hopper [Thu, 28 Jun 2012 22:08:12 +0000 (15:08 -0700)]
Update formatting of README to meet Puppet Labs best practices

12 years agoMerge branch 'ticket/master/14755-stub_iptables_facts_for_set_mark_tests'
Ken Barber [Thu, 21 Jun 2012 10:22:35 +0000 (11:22 +0100)]
Merge branch 'ticket/master/14755-stub_iptables_facts_for_set_mark_tests'

* ticket/master/14755-stub_iptables_facts_for_set_mark_tests:
  (#14755) Stub iptables facts for set_mark tests

12 years ago(#14755) Stub iptables facts for set_mark tests
Dan Carley [Tue, 12 Jun 2012 07:17:11 +0000 (08:17 +0100)]
(#14755) Stub iptables facts for set_mark tests

Tests both paths of new set_mark code for IPtables 1.3.2 and 1.4.2

Also allows these tests to run independently of the version of IPtables on
the host machine, if any at all.

12 years agoMerge branch 'fix_mark'
Ken Barber [Wed, 20 Jun 2012 17:37:34 +0000 (18:37 +0100)]
Merge branch 'fix_mark'

* fix_mark:
  (#14755) Stub iptables_version for now so tests run on non-Linux hosts
  (#14755) Fix mark to not repeat rules with iptables 1.4.1+.

12 years ago(#14755) Stub iptables_version for now so tests run on non-Linux hosts
Ken Barber [Wed, 20 Jun 2012 17:26:05 +0000 (18:26 +0100)]
(#14755) Stub iptables_version for now so tests run on non-Linux hosts

Without a stub some tests fail on non-Linux hosts. This is because they are
expecting a particular version of iptables to exist which isn't always true.

The right answer for the provider is to actually allow the fact to be set
per test, but for now we are doing a global override just to make tests pass.

12 years ago(#14755) Fix mark to not repeat rules with iptables 1.4.1+.
Sharif Nassar [Wed, 30 May 2012 23:12:21 +0000 (16:12 -0700)]
(#14755) Fix mark to not repeat rules with iptables 1.4.1+.

12 years agoMerge branch 'ticket/master/14949'
Ken Barber [Wed, 20 Jun 2012 17:09:31 +0000 (18:09 +0100)]
Merge branch 'ticket/master/14949'

* ticket/master/14949:
  (#14949) Added pkttype property

12 years ago(#14949) Added pkttype property
Ashley Penney [Mon, 21 May 2012 18:28:16 +0000 (14:28 -0400)]
(#14949) Added pkttype property

This adds the pkttype property so we can match multicast and broadcast packets.

12 years agoMerge pull request #85 from jasonhancock/ticket/15038-add_gre_protocol
Ken Barber [Thu, 14 Jun 2012 16:08:45 +0000 (09:08 -0700)]
Merge pull request #85 from jasonhancock/ticket/15038-add_gre_protocol

(#15038) add gre protocol to list of acceptable protocols

12 years ago(#15038) add gre protocol to list of acceptable protocols
Jason Hancock [Thu, 14 Jun 2012 15:21:09 +0000 (08:21 -0700)]
(#15038) add gre protocol to list of acceptable protocols

12 years agoMerge branch 'ticket/master/supported_versions'
Ken Barber [Sun, 10 Jun 2012 21:31:33 +0000 (22:31 +0100)]
Merge branch 'ticket/master/supported_versions'

* ticket/master/supported_versions:
  (maint) be clearer about what distributions we support

12 years ago(maint) be clearer about what distributions we support
Ken Barber [Sun, 10 Jun 2012 21:30:53 +0000 (22:30 +0100)]
(maint) be clearer about what distributions we support

12 years agoMerge branch '9364-normalise_addresses_to_cidr'
Ken Barber [Sun, 10 Jun 2012 21:17:24 +0000 (22:17 +0100)]
Merge branch '9364-normalise_addresses_to_cidr'

* 9364-normalise_addresses_to_cidr:
  (#9364 #10085) Normalise iptables-save to CIDR
  (#9364 #10085) Convert an existing test to CIDR

12 years ago(#9364 #10085) Normalise iptables-save to CIDR
Dan Carley [Thu, 24 May 2012 18:02:06 +0000 (19:02 +0100)]
(#9364 #10085) Normalise iptables-save to CIDR

Normalise all source and destination addresses to CIDR notation as they are
reverse-parsed from iptables-save. This ensures that they match how
addresses are forward-parsed by the type with Util::Firewall.host_to_ip.

Fixes two issues which both principally affect EL5 and may affect other
providers in the future.

Issue #9364:
    Single IP addresses not representing a range should be qualified in CIDR
    notation with /32 for IPv4 and /128 for IPv6.

Issue #10085:
    Addresses with a dotted quad netmask representing a range should be
    qualifed with in CIDR notation instead.

12 years ago(#9364 #10085) Convert an existing test to CIDR
Dan Carley [Thu, 24 May 2012 17:57:46 +0000 (18:57 +0100)]
(#9364 #10085) Convert an existing test to CIDR

Modify an existing test which has a source IP address without CIDR notation.
This will break after normalisation because [:params][:source] is expected
to be CIDR. Updating -s within [:line] too, since we aren't explcitly testing
that behaviour with this fixture.

12 years agoMerge branch 'ticket/master/14938-travis_matrices'
Ken Barber [Sun, 10 Jun 2012 17:23:01 +0000 (18:23 +0100)]
Merge branch 'ticket/master/14938-travis_matrices'

* ticket/master/14938-travis_matrices:
  (#14938) Add more test variations for travis testing

12 years ago(#14938) Add more test variations for travis testing
Ken Barber [Sun, 10 Jun 2012 14:56:17 +0000 (15:56 +0100)]
(#14938) Add more test variations for travis testing

Include different variations of Puppet to be tested, and fix any pending issues
so all tests pass.

12 years agoMerge branch 'travis_ci'
Ken Barber [Sat, 9 Jun 2012 23:41:18 +0000 (00:41 +0100)]
Merge branch 'travis_ci'

* travis_ci:
  (maint) Enable travis-ci support.

12 years ago(maint) Enable travis-ci support.
Ken Barber [Mon, 28 May 2012 11:41:36 +0000 (12:41 +0100)]
(maint) Enable travis-ci support.

12 years agoMerge branch '13560'
Ken Barber [Sat, 9 Jun 2012 23:29:47 +0000 (00:29 +0100)]
Merge branch '13560'

* 13560:
  (#13560) OUTPUT is a valid chain for the mangle table

12 years ago(#13560) OUTPUT is a valid chain for the mangle table
Adam Gibbins [Thu, 29 Mar 2012 15:47:09 +0000 (16:47 +0100)]
(#13560) OUTPUT is a valid chain for the mangle table

12 years agoMerge branch 'ticket/10025-TCP-flags-matching-support'
Ken Barber [Sat, 9 Jun 2012 23:20:03 +0000 (00:20 +0100)]
Merge branch 'ticket/10025-TCP-flags-matching-support'

* ticket/10025-TCP-flags-matching-support:
  (#10025) Make tcp_flags support a feature.
  (#10025) Add support for --tcp-flags

12 years ago(#10025) Make tcp_flags support a feature.
Ken Barber [Sat, 9 Jun 2012 23:18:04 +0000 (00:18 +0100)]
(#10025) Make tcp_flags support a feature.

12 years ago(#10025) Add support for --tcp-flags
Thomas Vander Stichele [Sun, 4 Mar 2012 17:16:20 +0000 (18:16 +0100)]
(#10025) Add support for --tcp-flags

12 years agoMerge pull request #60 from dcarley/10164-icmp_any
Ken Barber [Sat, 9 Jun 2012 23:01:21 +0000 (16:01 -0700)]
Merge pull request #60 from dcarley/10164-icmp_any

(#10164) Reject and document icmp => "any"

12 years agoMerge pull request #79 from mediatemple/limitfix
Ken Barber [Wed, 6 Jun 2012 14:55:28 +0000 (07:55 -0700)]
Merge pull request #79 from mediatemple/limitfix

(#14641) Fix for incorrect limit command arguments for ip6tables provider

12 years agoMerge pull request #80 from dcarley/10274-zero_prefixlen_addresses
Ken Barber [Mon, 28 May 2012 11:32:39 +0000 (04:32 -0700)]
Merge pull request #80 from dcarley/10274-zero_prefixlen_addresses

(#10274) Nullify addresses with zero prefixlen

12 years ago(#10274) Nullify addresses with zero prefixlen
Dan Carley [Fri, 25 May 2012 06:41:36 +0000 (07:41 +0100)]
(#10274) Nullify addresses with zero prefixlen

Modify the behaviour of Util::Firewall.host_to_ip, as used by the type to
parse source and destination addresses, to return nil if the resulting CIDR
represented address has a prefix length of zero. Includes type and provider
tests for IPv4 and IPv6.

IPtables silently omits rules with source and destination addresses that
have a prefix length of zero (eg. 0.0.0.0/0) because they are functionally
equivialent to not specifying any address. This was causing rules to be
unecessarily reloaded.

The behaviour of Util::IPcidr remains the same. Now includes some additional
tests for it's identification of zero prefixlen IPv4 and IPv6 addresses.

12 years ago(#10274) Document Util::Firewall.host_to_ip
Dan Carley [Fri, 25 May 2012 09:24:39 +0000 (10:24 +0100)]
(#10274) Document Util::Firewall.host_to_ip

Document the current behaviour of Util::Firewall.host_to_ip before it is
modified to handle addresses with zero prefix lengths.

12 years ago(#14641) Fix for incorrect limit command arguments for ip6tables provider
Michael Hsu [Tue, 22 May 2012 15:02:27 +0000 (08:02 -0700)]
(#14641) Fix for incorrect limit command arguments for ip6tables provider

13 years agoMerge branch 'ignore_errors'
Ken Barber [Sun, 20 May 2012 17:20:39 +0000 (18:20 +0100)]
Merge branch 'ignore_errors'

* ignore_errors:
  (#14590) Fix for when iptables-save spews out "FATAL" errors.

13 years ago(#14590) Fix for when iptables-save spews out "FATAL" errors.
Sharif Nassar [Sat, 21 Jan 2012 01:22:16 +0000 (17:22 -0800)]
(#14590) Fix for when iptables-save spews out "FATAL" errors.

On some broken Virtuozzo containers, /lib/modules/$(uname -r)/modules.dep is
absent. This causes iptables-save to give some "FATAL" errors.  This patch
fixes the parser to ignore them instead of generating garbage rules that make
for errors in the puppet agent run.

13 years agoMerge branch 'ticket/master/14455'
Ken Barber [Sun, 13 May 2012 21:52:58 +0000 (22:52 +0100)]
Merge branch 'ticket/master/14455'

* ticket/master/14455:
  (#14455) Add tests for interface names containing a "+". Add a few missing tests for VLAN support.
  (#14455) Support interface names containing "+"

13 years ago(#14455) Add tests for interface names containing a "+". Add a few missing tests...
Simon Deziel [Sat, 12 May 2012 15:24:59 +0000 (11:24 -0400)]
(#14455) Add tests for interface names containing a "+". Add a few missing tests for VLAN support.

13 years ago(#14455) Support interface names containing "+"
Simon Deziel [Sat, 12 May 2012 15:23:45 +0000 (11:23 -0400)]
(#14455) Support interface names containing "+"

Previously iniface and outiface wouldn't allow + in the interface names. This
patch fixes that.

13 years agoMerge pull request #72 from jashort/ticket/13896-fix_example
Ken Barber [Thu, 12 Apr 2012 09:03:40 +0000 (02:03 -0700)]
Merge pull request #72 from jashort/ticket/13896-fix_example

(#13896) Fix Firewall Example

13 years ago* (#13896) Changed 'jump' to 'action', commands to lower case
Jason Short [Wed, 11 Apr 2012 23:49:50 +0000 (16:49 -0700)]
* (#13896) Changed 'jump' to 'action', commands to lower case

13 years agoMerge pull request #69 from kbarber/ticket/10619-Unable_to_purge_rules
Dan Carley [Mon, 26 Mar 2012 08:44:38 +0000 (01:44 -0700)]
Merge pull request #69 from kbarber/ticket/10619-Unable_to_purge_rules

* (#10619) Add the table when deleting rules
* (#10619) Fix tests since we are now prefixing -t <table> during delete
* Fix extraneous trailing whitespace

13 years agoMerge pull request #70 from kbarber/ticket/11305-support_vlan_interface
Dan Carley [Mon, 26 Mar 2012 08:37:15 +0000 (01:37 -0700)]
Merge pull request #70 from kbarber/ticket/11305-support_vlan_interface

* (#11305) Support vlan interfaces
* (#11305) Add tests for VLAN support for iniface/outiface

13 years agoMerge pull request #61 from adamgibbins/master
Ken Barber [Mon, 26 Mar 2012 08:19:10 +0000 (01:19 -0700)]
Merge pull request #61 from adamgibbins/master

Improved Puppet DSL style as per the guidelines.

13 years agoFix extraneous trailing whitespace
Ken Barber [Sat, 24 Mar 2012 22:38:21 +0000 (22:38 +0000)]
Fix extraneous trailing whitespace

13 years ago(#10619) Fix tests since we are now prefixing -t <table> during delete
Ken Barber [Sat, 24 Mar 2012 22:35:07 +0000 (22:35 +0000)]
(#10619) Fix tests since we are now prefixing -t <table> during delete

13 years ago(#10619) Add the table when deleting rules
Johan Huysmans [Fri, 9 Dec 2011 11:47:54 +0000 (12:47 +0100)]
(#10619) Add the table when deleting rules

This fixes purging from tables other then 'filter'.

13 years ago(#11305) Add tests for VLAN support for iniface/outiface
Ken Barber [Sun, 25 Mar 2012 02:07:36 +0000 (03:07 +0100)]
(#11305) Add tests for VLAN support for iniface/outiface

This adds tests generally for iniface and outiface, and includes examples
of interfaces with VLAN's to support that change.

13 years ago(#11305) Support vlan interfaces (interface containing ".")
Johan Huysmans [Fri, 9 Dec 2011 09:05:28 +0000 (10:05 +0100)]
(#11305) Support vlan interfaces (interface containing ".")

13 years agoMerge pull request #68 from kbarber/ticket/master/13216-fixed_setup_instructions_in_r...
Dan Carley [Tue, 20 Mar 2012 08:01:52 +0000 (01:01 -0700)]
Merge pull request #68 from kbarber/ticket/master/13216-fixed_setup_instructions_in_readme

(#13216) Fix README so setup instructions actually work

13 years ago(#13216) Fix README so setup instructions actually work
Ken Barber [Mon, 19 Mar 2012 17:44:48 +0000 (17:44 +0000)]
(#13216) Fix README so setup instructions actually work

The old setup instructions were vague, and incorrect. This fixes those
instructions so they actually work, and breaks them out into their own
section.(#13216) Fix README so setup instructions actually work

13 years agoMerge pull request #67 from dcarley/13201-autoreq_chain
Ken Barber [Mon, 19 Mar 2012 16:36:09 +0000 (09:36 -0700)]
Merge pull request #67 from dcarley/13201-autoreq_chain

(#13201) Firewall autorequire Firewallchains

13 years ago(#13201) Tests and docstring for chain autorequire
Dan Carley [Sun, 18 Mar 2012 13:16:38 +0000 (13:16 +0000)]
(#13201) Tests and docstring for chain autorequire

Test for autorequire behaviour on :chain, :jump, and :chain + :jump params.
With both specified and default/undef :table and :provider params.

Document autorequire behaviour in docstring.

13 years ago(#13201) Firewall autorequire Firewallchains
Dan Carley [Sat, 17 Mar 2012 11:00:56 +0000 (11:00 +0000)]
(#13201) Firewall autorequire Firewallchains

Autorequire Firewallchain resources for Firewall resources that have jump or
chain parameters. Remove require params from README examples now that
they're not essential.

Only deals with iptables and ip6tables providers, which have support for
chains. Doesn't attempt to weed out chains that might be builtin. Just let
Puppet determine which of the resources are really managed.

13 years agoMerge pull request #63 from kbarber/ticket/master/13192_allvalidchains_order
Dan Carley [Sat, 17 Mar 2012 10:01:15 +0000 (03:01 -0700)]
Merge pull request #63 from kbarber/ticket/master/13192_allvalidchains_order

(#13192) Fix allvalidchain iteration

13 years ago(#13192) Fix allvalidchain iteration
Ken Barber [Fri, 16 Mar 2012 22:16:23 +0000 (15:16 -0700)]
(#13192) Fix allvalidchain iteration

Before this patch, we were getting errors because chain & table were swapped
during creation.

13 years agoMerge pull request #62 from kbarber/ticket/10162-firewallchain_support_for_merge
Jonathan Boyett [Fri, 16 Mar 2012 18:43:04 +0000 (11:43 -0700)]
Merge pull request #62 from kbarber/ticket/10162-firewallchain_support_for_merge

Ticket/10162 firewallchain support for merge

13 years ago(#10162) Fix examples for firewallchain in README
Ken Barber [Fri, 16 Mar 2012 17:11:03 +0000 (10:11 -0700)]
(#10162) Fix examples for firewallchain in README

13 years ago(#10162) Modify firewallchain name to be chain:table:protocol
Ken Barber [Mon, 12 Mar 2012 18:40:45 +0000 (11:40 -0700)]
(#10162) Modify firewallchain name to be chain:table:protocol

We've decided to change the ordering of the namevar so that it is now:

    chain:table:protocol

So its closer to a linear hierachy ie. chain in table in protocol.

Previously this was table:chain:protocol which made less sense.

13 years ago(#10162) Various fixes for firewallchain resource
Ken Barber [Mon, 12 Mar 2012 04:16:33 +0000 (21:16 -0700)]
(#10162) Various fixes for firewallchain resource

* Convert commands to optional_commands to avoid iptables installation chicken
  & egg scenarios.
* Downcase tables to match the table names in xtables
* Force fully qualifying the name as <table>:<chain>:<protocol>, we can add
  meaningful defaults later.
* puppet resource <name> command wasn't working as expected, but stripping out
  some of the meaningful defaults I was able to get this to work.
* Reformat some of the code to avoid overrunning 80 chars where possible
* Remove trailing whitespace
* Add flush to provider so that resource modifications immediately update the
  resource in reports and when using puppet resource.
* Removed any commented out code
* Improved documentation
* Change policy so its undefined when not set, instead of being :empty
* Fix test mocking so they will run on a Mac

13 years ago(#10162) add firewallchain type and iptables_chain provider
Daniel Black [Thu, 1 Mar 2012 01:46:02 +0000 (12:46 +1100)]
(#10162) add firewallchain type and iptables_chain provider

Add firewallchain type and iptables_chain provider. This is required
to support the firewall class and it is envisaged that an autorequire
will be used to automatically require the user chain. This type can also set
policies on inbuilt chains.

Provider covers ebtables (optional), iptables, ip6tables.

13 years agoMake Puppet DSL compliant with the style guides and puppet lint.
Adam Gibbins [Sun, 11 Mar 2012 21:16:40 +0000 (21:16 +0000)]
Make Puppet DSL compliant with the style guides and puppet lint.

13 years ago(#10164) Reject and document icmp => "any"
Dan Carley [Fri, 9 Mar 2012 09:13:33 +0000 (09:13 +0000)]
(#10164) Reject and document icmp => "any"

iptables accepts the string "any" as an ICMP type and stores it behind the
scenes as the fake (IANA reserved) numeric 255. This is functionally
equivalent to not specifying an `--icmp-type` argument.

ip6tables didn't carry this "feature" over. Like many other providers, the
matching of any ICMP packet type is only achieved by omitting the
`--icmpv6-type` arugment.

For the purpose of simpler logic and future provider compatibility we
prevent people from using the value "any" and advise them to omit/undefine
the param instead.

Include a test that somewhat duplicates the prevention of invalid strings
but would preserve this behaviour should icmp_name_to_number() ever change.

13 years agoMerge branch '12897-validate_log_params'
Dan Carley [Thu, 8 Mar 2012 15:57:01 +0000 (15:57 +0000)]
Merge branch '12897-validate_log_params'

(#12897) Require jump=>LOG for log params

13 years ago(#12897) Require jump=>LOG for log params
Daniel Black [Sun, 18 Dec 2011 09:16:19 +0000 (20:16 +1100)]
(#12897) Require jump=>LOG for log params

This validates that when log_prefix or log_level is specified the jump
should be 'LOG'

13 years agoMerge branch 'ticket/10165-port-commasep'
Ken Barber [Mon, 23 Jan 2012 17:18:26 +0000 (17:18 +0000)]
Merge branch 'ticket/10165-port-commasep'

* ticket/10165-port-commasep:
  (#10165) Display multi-value: port, sport, dport and state command seperated

13 years ago(#10165) Display multi-value: port, sport, dport and state command seperated
Daniel Black [Mon, 23 Jan 2012 05:55:44 +0000 (16:55 +1100)]
(#10165) Display multi-value: port, sport, dport and state command seperated

Previously the output that changed was munged when puppet was being ran, this
change provides a comma seperated output when the values change instead.

13 years agoMerge branch 'ticket/master/11673_ospf'
Ken Barber [Sun, 22 Jan 2012 19:40:15 +0000 (19:40 +0000)]
Merge branch 'ticket/master/11673_ospf'

* ticket/master/11673_ospf:
  (#11673) Adding OSPF(v3) protocol to puppetlabs-firewall

13 years ago(#11673) Adding OSPF(v3) protocol to puppetlabs-firewall
Arnoud Vermeer [Tue, 3 Jan 2012 09:59:28 +0000 (10:59 +0100)]
(#11673) Adding OSPF(v3) protocol to puppetlabs-firewall

Added support for ospf to the proto property.

13 years agoRevert "Merge pull request #34 from mediatemple/class-firewall"
Ken Barber [Fri, 13 Jan 2012 17:35:29 +0000 (17:35 +0000)]
Revert "Merge pull request #34 from mediatemple/class-firewall"

This reverts commit bfbf01b08d6cf05795dd9b69815e8556e95dcf07, reversing
changes made to 0b55830db9447d0398b6b346bf513dfa6e2ccd08.

This patch breaks the build, and wasn't ready for merge. The rspec test
scaffolding wasn't prepared and hasn't been tested with this module properly.

13 years agoMerge pull request #34 from mediatemple/class-firewall
Jonathan Boyett [Fri, 13 Jan 2012 17:11:24 +0000 (09:11 -0800)]
Merge pull request #34 from mediatemple/class-firewall

Initial creation of class firewall for issue #10984

13 years agoMerge pull request #50 from grooverdan/ticket/11443_fix_error_message
Ken Barber [Thu, 29 Dec 2011 11:05:16 +0000 (03:05 -0800)]
Merge pull request #50 from grooverdan/ticket/11443_fix_error_message

(#11443) simple fix of the error message for allowed values of the jump property

13 years ago(#11443) simple fix of the error message for allowed values of the jump property
Daniel Black [Thu, 29 Dec 2011 05:11:50 +0000 (16:11 +1100)]
(#11443) simple fix of the error message for allowed values of the jump property

The condition on jump says its allowed accept, reject and drop. Update
the error message to say the same thing

13 years ago(#11334) Fix broken call to super for ruby-1.9.2 in munge.
Ken Barber [Thu, 29 Dec 2011 04:33:14 +0000 (04:33 +0000)]
(#11334) Fix broken call to super for ruby-1.9.2 in munge.

13 years agoMerge branch 'ticket/master/11334-MARK_support'
Ken Barber [Thu, 29 Dec 2011 04:26:11 +0000 (04:26 +0000)]
Merge branch 'ticket/master/11334-MARK_support'

* ticket/master/11334-MARK_support:
  (#11334) Add support for MARK target and set-mark property.

13 years ago(#11334) Add support for MARK target and set-mark property.
Johan Huysmans [Mon, 12 Dec 2011 09:34:43 +0000 (10:34 +0100)]
(#11334) Add support for MARK target and set-mark property.

This commit adds support for the set-mark iptables property and will validate
its use against the MARK jump target. This will also support handling decimal
or hexadecimal conversion where necessary.

13 years ago(#10984) Initial creation of class firewall
Sharif Nassar [Sat, 12 Nov 2011 13:31:11 +0000 (05:31 -0800)]
(#10984) Initial creation of class firewall

* Add Exec[firewall-persist] to save rules.  This allows the host to
  have iptables rules on reboot, before puppet runs.
* Debian hates you.  Add iptables init scripts for loading iptables at
  boot on releases of Debian that do not have them already.
* Add brains to the iptables/ip6tables providers to ensure kernel modules
  are loaded.

13 years ago(maint) Updated CHANGELOG.md to use bullet points for Changes for v0.0.4 v0.0.4
Ken Barber [Mon, 5 Dec 2011 22:54:04 +0000 (22:54 +0000)]
(maint) Updated CHANGELOG.md to use bullet points for Changes for v0.0.4

13 years agoMerge branch 'ticket/11114-release_0.0.4'
Ken Barber [Mon, 5 Dec 2011 22:48:58 +0000 (22:48 +0000)]
Merge branch 'ticket/11114-release_0.0.4'

* ticket/11114-release_0.0.4:
  (#11114) Release 0.0.4 - CHANGELOG.md and Modulefile update

13 years ago(#11114) Release 0.0.4 - CHANGELOG.md and Modulefile update
Jonathan Boyett [Mon, 5 Dec 2011 19:48:00 +0000 (11:48 -0800)]
(#11114) Release 0.0.4 - CHANGELOG.md and Modulefile update

13 years agoMerge branch 'ticket/10957-iptables-facts'
Ken Barber [Sat, 3 Dec 2011 21:18:23 +0000 (21:18 +0000)]
Merge branch 'ticket/10957-iptables-facts'

* ticket/10957-iptables-facts:
  (#10957) add iptables_version and ip6tables_version facts

13 years ago(#10957) add iptables_version and ip6tables_version facts
Jonathan Boyett [Wed, 30 Nov 2011 23:54:29 +0000 (15:54 -0800)]
(#10957) add iptables_version and ip6tables_version facts

These facts return the version of iptables or ip6tables by running --version
on the binary in question.

13 years agoMerge branch 'ticket/10723-hosts_to_cidr'
Ken Barber [Sat, 3 Dec 2011 20:56:02 +0000 (20:56 +0000)]
Merge branch 'ticket/10723-hosts_to_cidr'

* ticket/10723-hosts_to_cidr:
  (#10723) Munge hostnames and IPs to IPs with CIDR

13 years ago(#10723) Munge hostnames and IPs to IPs with CIDR
Jonathan Boyett [Thu, 17 Nov 2011 17:43:19 +0000 (09:43 -0800)]
(#10723) Munge hostnames and IPs to IPs with CIDR

Previously when hostnames were used in the source and destination properties
they were being converted to IP address by iptables. This meant that later
comparisons were failing because the property in code (a hostname) and the
'real' property returned by introspection (an ip address) were not matching.

This code using the munge facility will automatically detect and convert
hostnames to IP addresses in the type so the comparison works as expected.

The side-effect is that puppet does the hostname to IP conversion, not
iptables.

13 years agoMerge branch 'ticket/11093-log_level'
Ken Barber [Thu, 1 Dec 2011 11:18:36 +0000 (11:18 +0000)]
Merge branch 'ticket/11093-log_level'

* ticket/11093-log_level:
  (#11093) Improve log_level property so it converts names to numbers

13 years ago(#11093) Improve log_level property so it converts names to numbers
Jonathan Boyett [Thu, 1 Dec 2011 02:52:35 +0000 (18:52 -0800)]
(#11093) Improve log_level property so it converts names to numbers

Previously the log_level property was constantly reloading due to the fact
that iptables was converting names to numbers. So unless you were using
numbers in your log_level setting, it was constantly telling you it needed
to be changed.

Now we convert the names to numbers in the munge so when comparing it will
always hopefully match.

Also, the default value when the jump value is 'LOG' is now set to 4 (warn)
based on iptables own defaults.

13 years agoMerge pull request #38 from mediatemple/owner-match
Jonathan Boyett [Wed, 30 Nov 2011 21:12:05 +0000 (13:12 -0800)]
Merge pull request #38 from mediatemple/owner-match

(#10718) Add owner-match support

13 years ago(#10718) Add owner-match support
Sharif Nassar [Mon, 14 Nov 2011 03:10:08 +0000 (19:10 -0800)]
(#10718) Add owner-match support

13 years agoMerge pull request #39 from mediatemple/ipencap-fixtures
Jonathan Boyett [Wed, 30 Nov 2011 20:49:12 +0000 (12:49 -0800)]
Merge pull request #39 from mediatemple/ipencap-fixtures

(#10997) Add fixtures for ipencap

13 years agoMerge pull request #37 from mediatemple/whitespace
Dan Carley [Thu, 24 Nov 2011 16:08:52 +0000 (08:08 -0800)]
Merge pull request #37 from mediatemple/whitespace

Whitespace cleanup. (#11034)

13 years agoMerge branch 'ticket/10997-ipencap'
Ken Barber [Tue, 22 Nov 2011 10:57:13 +0000 (10:57 +0000)]
Merge branch 'ticket/10997-ipencap'

* ticket/10997-ipencap:
  (#10997) Add ipencap (protocol 4) support to firewall type property 'proto'

13 years ago(#10997) Add ipencap (protocol 4) support to firewall type property 'proto'
Sharif Nassar [Sat, 12 Nov 2011 21:08:29 +0000 (13:08 -0800)]
(#10997) Add ipencap (protocol 4) support to firewall type property 'proto'

This change adds ipencap as a viable option, and adds it to tests as well.

13 years agoMerge pull request #33 from saysjonathan/ticket/10690-port
Jonathan Boyett [Fri, 18 Nov 2011 22:12:02 +0000 (14:12 -0800)]
Merge pull request #33 from saysjonathan/ticket/10690-port

(#10690) add port property support to ip6tables

13 years ago(#10690) add port property support to ip6tables
Jonathan Boyett [Fri, 18 Nov 2011 21:54:35 +0000 (13:54 -0800)]
(#10690) add port property support to ip6tables

13 years agoAdd fixtures for ipencap
Sharif Nassar [Mon, 14 Nov 2011 06:04:42 +0000 (22:04 -0800)]
Add fixtures for ipencap

13 years agoWhitespace cleanup.
Sharif Nassar [Sun, 13 Nov 2011 12:23:28 +0000 (04:23 -0800)]
Whitespace cleanup.