Projet

Général

Profil

Paste
Télécharger au format
Statistiques
| Branche: | Révision:

root / manifests @ 6ee35b94

# Date Auteur Commentaire
16fd95b1 2024-08-04 04:10 canihavethisone

Update init.pp comments

e0bb7852 2024-08-03 23:15 canihavethisone

Change default hash location to /var/tmp to survive reboots and avoid bogus nftables reload

c1bd001d 2024-08-03 21:16 canihavethisone

Added shell provider to execs. Hash generate now in array. Ran rubocop:autocorrect

c00bcf2d 2024-08-03 09:47 canihavethisone

Changed path to use fact. Partial conversion of execs to arrays

3016d428 2024-08-03 00:02 canihavethisone

Change exec title

0b2ccdda 2024-08-02 23:58 canihavethisone

Fix typos

c6941cfe 2024-08-02 23:30 canihavethisone

Correct docstring

0b1e3353 2024-08-02 23:25 canihavethisone

Added purge_unmanaged_rules new variant of method

a528bf59 2024-06-27 06:33 Steve Traylen

New clobber_default_config paramter

Certain OSes namely Debian and Archlinux provide default rules
with the OS.

This module has always respected those rules and appended all of
its own rules to the end of the existing rules.

The new parameter `clobber_default_config` if set `true` (default `false`)...

1ef7d5c4 2023-12-31 08:42 Tim Meusel

rules::llmnr: Allow interface filtering

3e2b5119 2023-12-31 08:11 Tim Meusel

rules::ospf3: Allow filtering on incoming interfaces

925c358d 2023-12-31 08:11 Tim Meusel

rules::out::ospf3: Allow filtering on outgoing interfaces

4c3d5d6b 2023-12-31 07:57 Tim Meusel

rules::mdns: Allow interface filtering

51850192 2023-12-31 07:57 Tim Meusel

rules::out::mdns: Allow interface filtering

8cdd24a5 2023-12-29 10:23 Tim Meusel

rules::icmp: Allow ICMP packets with extensions

d1864b10 2023-12-29 08:25 Tim Meusel

out::icmp: simplify filtering/fix ICMP bug

5d554e75 2023-12-29 07:32 Tim Meusel

out::icmp: Add parameter documentation

f9de4dee 2023-12-29 07:31 Tim Meusel

out::icmp: reformat code

e846c98b 2023-12-27 06:02 Tim Meusel

simplerule: Allow multiple oifname/iifname

eac19d14 2023-12-20 14:51 Tim Meusel

Make "dropping invalid packets" configureable

It doesn't make sense to explicitly drop those pakets when the default
policy is already `DROP`. Also some applications, like ceph, are known
to send packets that might be marked as invalid.

d7d6d5d3 2023-12-20 13:31 Tim Meusel

simplerule: Add support for outgoing interface filtering

9d1ee648 2023-12-20 04:41 Tim Meusel

rules::out:dns: refactor for better readability

25b3f3f4 2023-12-19 12:36 Tim Meusel

simplerule: Add support for incoming interface filtering

2732318a 2023-12-06 04:19 Tames McTigue

Document what the 'auto_merge' parameter does.

67cdcf15 2023-11-24 02:52 Steve Traylen

Support input interface specification to dns server

Useful when you want to allow docker/podman containers
access to a hosts dns stub resolver.

```puppet
class{'nftables::rules::dns':
iifname => ['docker0'],
}
```

a7cb6803 2023-11-23 02:38 Steve Traylen

Merge pull request #214 from traylenator/podman

Additional rules for podman root containers

94285e5f 2023-11-22 04:40 Steve Traylen

Example how to redirect one port to another

Add example how to redirect traffic from one port to another.

08b9f1d0 2023-11-22 03:53 Steve Traylen

Additional rules for podman root containers

This class defines additional forwarding rules to let root containers
reach external networks when using Netavark (since v4.0) or CNI (deprecated).
At the time of writing, Podman supports automatic configuration...

baad986e 2023-11-16 19:10 Vadym Chepkov

add ftp helper

This adds ability to enable a connection tracker helper and provides typical ftp rules

Co-authored-by: Vadym Chepkov <>
Co-authored-by: Yury Bushmelev <>

a9bbb10d 2023-10-28 09:05 Vadym Chepkov

provide an option to disable logging rejected packets

64404839 2023-08-27 05:09 Tim Meusel

samba: Add option to drop traffic

ffc8b86f 2023-08-26 18:20 Tim Meusel

Add nftables rules for ws-discovery

50a5be8b 2023-08-26 18:05 Tim Meusel

Add rule for incoming SSDP

d7e26575 2023-08-26 17:47 Tim Meusel

init.pp: disable check_unsafe_interpolations

3b26826f 2023-08-25 19:07 Tim Meusel

Add rule for incoming LLMNR

6b350264 2023-08-19 16:22 Tim Meusel

Add rule for outgoing multicast DNS

e499cece 2023-08-19 15:52 Tim Meusel

Add rule for multicast listener requests (MLDv2)

ad3dbd7d 2023-08-18 10:40 Ewoud Kohl van Wijngaarden

Rewrite mdns rules to limit to multicast and allow IPv6

This limits the mdns listener to only listen on multicast addresses with
port 5353. One rule for IPv4 and one for IPv6, each controllable with a
parameter.

The generic 5353 to 5353 rule is dropped since it's redundant when I...

020842af 2023-08-09 20:00 Tim Meusel

Add rules for IGMP

c2e342b2 2023-08-09 19:21 Tim Meusel

mDNS: Allow udp port 5353

5ffd0328 2023-08-09 19:11 Tim Meusel

Add rule to allow multicast DNS

8b131276 2023-08-09 18:53 Tim Meusel

Add rule to allow incoming spotify broadcast

80b384c8 2023-08-09 17:57 Tim Meusel

Add rule to allow incoming multicast traffic

5b13f220 2023-07-31 17:16 Javier Angulo

change parameters order: required before optional

ea29e235 2023-06-19 12:58 Simon Hoenscheid

add ldap and active directory rules

666c3138 2023-04-29 14:53 Louis-Philippe Véronneau

Fix typo in icinga2 rule documentation

7030bde0 2023-03-23 05:28 Luis Fernández Álvarez

Add bridge as a valid family for chain tables

509ef14f 2023-01-29 12:29 Tim Meusel

Merge pull request #149 from hugendudel/netdev_support

Allow netdev as table family in defined type nftables::chain

0b7bcb5d 2023-01-04 05:01 mh

Align filemode on RedHat to distro default

The RPM acutally ships the configuration and directory with
0600/0700 while this module sets the mode to 0640/0750.

However, this has the drawback that on new nftables RPM versions,
we are setting it back to the modules mode and triggering an nft...

a1f09048 2022-10-24 16:59 Tim Meusel

Add class for outgoing HKP firewalling

cdd872a9 2022-09-07 08:34 Harm Endres

Allow netdev as table family in defined type nftables::chain

9e42547b 2022-09-04 16:35 mh

split conntrack management into dedicated classes so they get consumeable

331b8d85 2022-09-01 05:22 Steve Traylen

New nftables::file type to include raw file

For example:

```puppet
nftables::file{'geoip':
content => "include \"/files/geoipsets/dbip/*.ipv4\"\n",
}
```

will right a file or content into the nftables configuration.

The file written will be included in configuration....

9d61323e 2022-08-26 07:47 Steve Traylen

Merge pull request #144 from duritong/fix-143-properly-escape-rulename

Properly escape bridge in rulename

cb38423a 2022-08-24 03:06 mh

fix #143 - properly escape rulename for interfaces

1fd3f550 2022-08-19 09:07 Luis Fernández Álvarez

Add all families as a valid noflush pattern

nftables has more valid families than the ones currently accepted by the
module.

This patch adds support for all the families currently supported as per
the documentation at:
https://wiki.nftables.org/wiki-nftables/index.php/Nftables_families

7937a13b 2022-07-11 04:18 Tim Meusel

chrony: Allow filtering for outgoing NTP servers

2b1896c1 2022-07-10 06:42 Tim Meusel

Add rule to allow outgoing whois queries

9ad64784 2022-07-07 11:04 Tim Meusel

Update manifests/rules/pxp_agent.pp

Co-authored-by: Steve Traylen <>

194e05d5 2022-07-07 08:53 Tim Meusel

Add class for outgoing PXP connections

7f74df2e 2022-07-07 08:10 Tim Meusel

Add class for pxp-agent firewalling

008c95d7 2022-07-06 02:31 Kienan Stewart

Add Debian support

cc9fc807 2022-07-05 12:04 Tim Meusel

systemctl: Use relative path

7fb93f38 2022-07-05 08:50 Tim Meusel

make path to echo configureable

8842a597 2022-07-05 08:23 Tim Meusel

make path to `nft` binary configureable

0c9bc308 2022-02-27 11:05 hashworks

Add support for Arch Linux

Arch Linux stores the configuration in a different path and does not
provide firewalld without explicit installation.

This basically the same as #66 – I've reused their code since it hasn't
been merged in a while.

d1988178 2022-02-26 12:53 Tim Meusel

Merge pull request #112 from keachi/ospf_protocol

Use protocol number instead of label

2063deaf 2022-02-26 09:19 hashworks

Fix typos in initial reference examples

cbe342b9 2021-11-17 01:51 tr

Use protocol number instead of label

The label was `ospf` and will be `ospfigp` in the future. Instead of
creating a map use the protocol number to be compatible with newer
versions.

fcb79d73 2021-09-07 05:37 Ben Morrice

support a different table name for 'nat'
- Some applications (such as libvirt) still use iptables to inject firewall
rules
- iptables will refuse to update tables that were initially created with nft
- This commit allows defining the name of the 'nat' table in order to avoid...

de3e7bb0 2021-07-24 09:44 Tim Meusel

fix datatype for $dport

324b6851 2021-07-24 09:43 Tim Meusel

fix datatype for $table

c94658e1 2021-07-06 11:46 Nacho Barrientos

Allow declaring the same set in several tables

Closes #100

7b9d6ffc 2021-05-31 04:42 Nacho Barrientos

Allow creating a totally empty firewall

By setting `nftables::inet_filter` and `nftables::nat` to `false`
users can now start off from a totally empty firewall and add the
tables, chains and rules they'd like.

The default skeleton for inet-filter, ip-nat and ip6-nat is kept...

cd2a3cbf 2021-03-25 03:30 Nacho Barrientos

Add rules for QEMU/libvirt guests

1bf717d9 2021-03-23 08:34 Luis Fernández Álvarez

Add optional handling of chains

9dca9bc3 2021-03-23 06:29 Luis Fernández Álvarez

Fix doc defaults

c3515492 2021-03-19 08:48 Luis Fernández Álvarez

Add newline & more tests

6be2adf7 2021-03-19 07:12 Luis Fernández Álvarez

Add Docker-CE default rules

771b3256 2021-03-15 09:59 Nacho Barrientos

Add rules for Apache ActiveMQ

942569ea 2021-02-14 10:00 duritong

Merge pull request #73 from Koumbit/global_chain_not_hardcoded

start declaring the 'global' chain with module resources

1a4f336e 2021-02-11 16:42 Gabriel Filion

start declaring the 'global' chain with module resources

the 'global' chain is a vestigial piece of early development on this
module, but it can be useful for creating fast short-circuits like
blocking traffic that match a certain set of IPs.

in the current state we can't inject rules inside the 'global' chain...

13f26dfc 2021-01-26 07:17 Nacho Barrientos

Improve nftables::rule's documentation (#68)

19908f41 2021-01-18 14:07 mh

add some mail related outgoing rules

e2031b31 2021-01-18 11:18 Tim Meusel

Merge pull request #64 from traylenator/params

Enable parameter_documentation lint

e977eb3b 2021-01-18 11:17 Tim Meusel

Merge pull request #62 from glpatcern/master

Added Samba in rules

09cba182 2021-01-18 10:36 Steve Traylen

Enable parameter_documentation lint

The linter checks that every parameter has been documented.

While corrections have been made to great many classes some more
complicated examples have been left for now. Should be updated
as the files get touched.

https://github.com/domcleal/puppet-lint-param-docs

354a82d9 2021-01-18 10:19 Giuseppe Lo Presti

Removed unneeded parentheses

4470f70c 2021-01-18 09:36 Giuseppe Lo Presti

Updated docs

Co-authored-by: Nacho Barrientos <>

e743f82e 2021-01-18 08:35 Giuseppe Lo Presti

Made ctdb rule parameterized

8c00b818 2021-01-18 07:37 Nacho Barrientos

Pull up rule regexp to type aliases

a6f61c62 2021-01-18 05:51 Giuseppe Lo Presti

Added Samba in rules

6a4ffead 2021-01-13 11:10 Nacho Barrientos

Align simplerule and rule rulename requirements

94a80621 2020-12-14 05:07 Steve Traylen

Use Stdlib::Port everywhere in place of Integer

Use Stdlib::Port in place of Integer for ports

Fixes #37

c868cae3 2020-12-14 03:27 Tim Meusel

Update manifests/set.pp

13f4e4c6 2020-12-14 03:06 Steve Traylen

Docs for nftables::set

04176b0e 2020-12-13 16:52 mh

switch naming to puppetserver

948ebc98 2020-12-11 02:25 Nacho Barrientos

Prefix custom tables with custom- so they're loaded

bacf254e 2020-12-11 02:19 Nacho Barrientos

Merge pull request #48 from cernops/config_template

Several fixes for nftables::config

c2800a39 2020-12-10 15:21 duritong

Merge pull request #50 from traylenator/moretests

Correct nfs3 invalid udp /tcp matching rule and more tests