Projet

Général

Profil

Paste
Télécharger au format
Statistiques
| Branche: | Révision:

root / spec @ 72304a23

# Date Auteur Commentaire
ee93f2de 2025-02-07 04:33 Simon Hoenscheid

add icinga2 rule for outgoing traffic

8f4434ed 2025-02-06 15:39 Steve Traylen

Install netbase for /etc/services on Ubuntu 20.04

On Ubuntu 20.04 only the nftables package no longer depends on netbase.

The result is the required `/etc/services` file is not installed.

Always install `netbase` on Ubuntu 20.04

c88d259d 2025-02-06 15:39 Steve Traylen

Revert "Install netbase for /etc/services file"

This reverts commit 25528bfc63df27900cc2f91ef32bd4ccddef7382.

8ef25aa2 2025-02-06 15:39 Steve Traylen

Install netbase for /etc/services file

aedd9325 2025-02-05 17:36 Tim Meusel

set service provider to systemd in unit tests

8cbcf05f 2024-08-04 07:06 Tim Meusel

Merge pull request #252 from phaedriel/addr_array

Add support Arrays of source/destination IP addresses for nftables::simplerule

65ed81ba 2024-08-04 06:55 Tim Meusel

partial modulesync 9.1.0

This excludes the Gemfile changes

e0bb7852 2024-08-03 23:15 canihavethisone

Change default hash location to /var/tmp to survive reboots and avoid bogus nftables reload

c1bd001d 2024-08-03 21:16 canihavethisone

Added shell provider to execs. Hash generate now in array. Ran rubocop:autocorrect

c00bcf2d 2024-08-03 09:47 canihavethisone

Changed path to use fact. Partial conversion of execs to arrays

3016d428 2024-08-03 00:02 canihavethisone

Change exec title

0b2ccdda 2024-08-02 23:58 canihavethisone

Fix typos

0b1e3353 2024-08-02 23:25 canihavethisone

Added purge_unmanaged_rules new variant of method

9d02e9f8 2024-07-31 07:54 Stéphanie Jaumotte

Add variant array

2340d1d6 2024-06-27 07:25 Steve Traylen

Run default destroying acceptance tests at end

The spec test destroy_spec was purging default nftables configurations
before other existing tests had a chance to run.

Run the default destroying tests as the final test.

a528bf59 2024-06-27 06:33 Steve Traylen

New clobber_default_config paramter

Certain OSes namely Debian and Archlinux provide default rules
with the OS.

This module has always respected those rules and appended all of
its own rules to the end of the existing rules.

The new parameter `clobber_default_config` if set `true` (default `false`)...

8bc8fe98 2024-06-27 06:12 Steve Traylen

Accept on Debian 11 nftables::set will fail

On Debian 11 adding an nftables set triggers a bug:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063690

move the `nftables::set` tests out to their own test which makes sense
anyway and mark as pending for Debian 11.

1ef7d5c4 2023-12-31 08:42 Tim Meusel

rules::llmnr: Allow interface filtering

3e2b5119 2023-12-31 08:11 Tim Meusel

rules::ospf3: Allow filtering on incoming interfaces

925c358d 2023-12-31 08:11 Tim Meusel

rules::out::ospf3: Allow filtering on outgoing interfaces

4c3d5d6b 2023-12-31 07:57 Tim Meusel

rules::mdns: Allow interface filtering

51850192 2023-12-31 07:57 Tim Meusel

rules::out::mdns: Allow interface filtering

8cdd24a5 2023-12-29 10:23 Tim Meusel

rules::icmp: Allow ICMP packets with extensions

eac19d14 2023-12-20 14:51 Tim Meusel

Make "dropping invalid packets" configureable

It doesn't make sense to explicitly drop those pakets when the default
policy is already `DROP`. Also some applications, like ceph, are known
to send packets that might be marked as invalid.

d7d6d5d3 2023-12-20 13:31 Tim Meusel

simplerule: Add support for outgoing interface filtering

9d1ee648 2023-12-20 04:41 Tim Meusel

rules::out:dns: refactor for better readability

25b3f3f4 2023-12-19 12:36 Tim Meusel

simplerule: Add support for incoming interface filtering

67cdcf15 2023-11-24 02:52 Steve Traylen

Support input interface specification to dns server

Useful when you want to allow docker/podman containers
access to a hosts dns stub resolver.

```puppet
class{'nftables::rules::dns':
iifname => ['docker0'],
}
```

b5633532 2023-11-23 02:46 Tim Meusel

Merge pull request #189 from tskirvin/master

nftables::simplerule::dport - takes port ranges as part of the array

08b9f1d0 2023-11-22 03:53 Steve Traylen

Additional rules for podman root containers

This class defines additional forwarding rules to let root containers
reach external networks when using Netavark (since v4.0) or CNI (deprecated).
At the time of writing, Podman supports automatic configuration...

baad986e 2023-11-16 19:10 Vadym Chepkov

add ftp helper

This adds ability to enable a connection tracker helper and provides typical ftp rules

Co-authored-by: Vadym Chepkov <>
Co-authored-by: Yury Bushmelev <>

825f4eb1 2023-11-08 13:37 Tim Skirvin

trying out a spec to mix port arrays and ranges

d7bd6638 2023-11-07 17:28 Tim Skirvin

spec update to confirm that port ranges work

ffc8b86f 2023-08-26 18:20 Tim Meusel

Add nftables rules for ws-discovery

50a5be8b 2023-08-26 18:05 Tim Meusel

Add rule for incoming SSDP

3b26826f 2023-08-25 19:07 Tim Meusel

Add rule for incoming LLMNR

6b350264 2023-08-19 16:22 Tim Meusel

Add rule for outgoing multicast DNS

e499cece 2023-08-19 15:52 Tim Meusel

Add rule for multicast listener requests (MLDv2)

b0b538e0 2023-08-17 10:39 Tim Meusel

modulesync 7.0.0

020842af 2023-08-09 20:00 Tim Meusel

Add rules for IGMP

5ffd0328 2023-08-09 19:11 Tim Meusel

Add rule to allow multicast DNS

8b131276 2023-08-09 18:53 Tim Meusel

Add rule to allow incoming spotify broadcast

80b384c8 2023-08-09 17:57 Tim Meusel

Add rule to allow incoming multicast traffic

ea29e235 2023-06-19 12:58 Simon Hoenscheid

add ldap and active directory rules

7030bde0 2023-03-23 05:28 Luis Fernández Álvarez

Add bridge as a valid family for chain tables

509ef14f 2023-01-29 12:29 Tim Meusel

Merge pull request #149 from hugendudel/netdev_support

Allow netdev as table family in defined type nftables::chain

9e100a98 2023-01-29 12:17 Nacho Barrientos

Add acceptance test covering tables of type netdev

0b7bcb5d 2023-01-04 05:01 mh

Align filemode on RedHat to distro default

The RPM acutally ships the configuration and directory with
0600/0700 while this module sets the mode to 0640/0750.

However, this has the drawback that on new nftables RPM versions,
we are setting it back to the modules mode and triggering an nft...

a1f09048 2022-10-24 16:59 Tim Meusel

Add class for outgoing HKP firewalling

9e42547b 2022-09-04 16:35 mh

split conntrack management into dedicated classes so they get consumeable

331b8d85 2022-09-01 05:22 Steve Traylen

New nftables::file type to include raw file

For example:

```puppet
nftables::file{'geoip':
content => "include \"/files/geoipsets/dbip/*.ipv4\"\n",
}
```

will right a file or content into the nftables configuration.

The file written will be included in configuration....

9d61323e 2022-08-26 07:47 Steve Traylen

Merge pull request #144 from duritong/fix-143-properly-escape-rulename

Properly escape bridge in rulename

cb38423a 2022-08-24 03:06 mh

fix #143 - properly escape rulename for interfaces

1d7eb86a 2022-08-24 02:46 mh

remove duplicate expect

this is handled by the next - more specific - expect anyways

1fd3f550 2022-08-19 09:07 Luis Fernández Álvarez

Add all families as a valid noflush pattern

nftables has more valid families than the ones currently accepted by the
module.

This patch adds support for all the families currently supported as per
the documentation at:
https://wiki.nftables.org/wiki-nftables/index.php/Nftables_families

7937a13b 2022-07-11 04:18 Tim Meusel

chrony: Allow filtering for outgoing NTP servers

2b1896c1 2022-07-10 06:42 Tim Meusel

Add rule to allow outgoing whois queries

194e05d5 2022-07-07 08:53 Tim Meusel

Add class for outgoing PXP connections

7f74df2e 2022-07-07 08:10 Tim Meusel

Add class for pxp-agent firewalling

008c95d7 2022-07-06 02:31 Kienan Stewart

Add Debian support

cc9fc807 2022-07-05 12:04 Tim Meusel

systemctl: Use relative path

8842a597 2022-07-05 08:23 Tim Meusel

make path to `nft` binary configureable

435a5db2 2022-03-08 02:59 Steve Traylen

rspec mock systemd process on docker

On docker rspec the service provider is autodetected as redhat
rather than systemd.

https://tickets.puppetlabs.com/browse/PUP-11167

That causes

```
error during compilation: Parameter enable failed on Service[firewalld]: Provider redhat must have features 'maskable' to set 'enable' to 'mask' (file: /builds/ai/it-puppet-module-nftables/code/spec/fixtures/modules/nftables/manifests/init.pp, line: 186)...

232c1364 2022-03-08 02:08 Steve Traylen

Migrate from deprecated mocha

0c9bc308 2022-02-27 11:05 hashworks

Add support for Arch Linux

Arch Linux stores the configuration in a different path and does not
provide firewalld without explicit installation.

This basically the same as #66 – I've reused their code since it hasn't
been merged in a while.

432af5d3 2022-02-08 11:12 Nacho Barrientos

Make sure that the list of interfaces is mocked

If 'networking' is not removed from the facts, the values declared in
`default_module_facts.yml` win (the fact set contains two keys:
`:networking` and `'networking'`)

This test has always been wrong as the interfaces were never been...

b5874974 2021-12-16 09:54 Steve Traylen

rubocop - RSpec/RepeatedExampleGroupBody

6c2f0f10 2021-12-16 09:26 Steve Traylen

rubocop -f RSpec/RepeatedExampleGroupDescription

c82b960a 2021-12-16 08:55 Steve Traylen

rubocop:auto_correct results

20eaf3c2 2021-12-15 14:40 Tim Stallmann

modulesync 5.1.0

fa92e118 2021-09-17 21:35 Romain Tartière

Pet rubocop

5fea281f 2021-09-17 21:33 Tim Stallmann

modulesync 4.2.0

fcb79d73 2021-09-07 05:37 Ben Morrice

support a different table name for 'nat'
- Some applications (such as libvirt) still use iptables to inject firewall
rules
- iptables will refuse to update tables that were initially created with nft
- This commit allows defining the name of the 'nat' table in order to avoid...

c94658e1 2021-07-06 11:46 Nacho Barrientos

Allow declaring the same set in several tables

Closes #100

7b9d6ffc 2021-05-31 04:42 Nacho Barrientos

Allow creating a totally empty firewall

By setting `nftables::inet_filter` and `nftables::nat` to `false`
users can now start off from a totally empty firewall and add the
tables, chains and rules they'd like.

The default skeleton for inet-filter, ip-nat and ip6-nat is kept...

bd8baa0f 2021-04-26 12:27 Nacho Barrientos

Fix IPv4 source address type detection

Before this patch, a rule like this:

```
nftables::simplerule { 'foo':
action => 'accept',
dport => 443,
proto => 'tcp4',
saddr => '192.168.1.10',
}
```

would incorrectly generate this rule:...

1eda6efa 2021-04-21 09:46 Steve Traylen

Rely on puppet 6 calling daemon-reload

Since Puppet 6 now there no need to explicitly
call `systemctl daemon-reload`.

cd2a3cbf 2021-03-25 03:30 Nacho Barrientos

Add rules for QEMU/libvirt guests

18b211e7 2021-03-24 17:46 duritong

Merge pull request #80 from luisfdez/dockerce

Add Docker-CE default rules

1bf717d9 2021-03-23 08:34 Luis Fernández Álvarez

Add optional handling of chains

032387dc 2021-03-23 02:59 Steve Traylen

Add nftables.version to structured fact.

```
FACTERLIB=. facter -p nftables {
tables => [
"bridge-filter",
"bridge-nat",
"inet-firewalld",
"ip-firewalld",
"ip6-firewalld"
],
version => "0.9.3"
}
```

b61ccb4a 2021-03-19 09:04 Luis Fernández Álvarez

Fix rulename spec in spec

283e1c3c 2021-03-19 08:56 Luis Fernández Álvarez

Fix syntax

c3515492 2021-03-19 08:48 Luis Fernández Álvarez

Add newline & more tests

6be2adf7 2021-03-19 07:12 Luis Fernández Álvarez

Add Docker-CE default rules

771b3256 2021-03-15 09:59 Nacho Barrientos

Add rules for Apache ActiveMQ

92e0fcb6 2021-03-02 08:31 duritong

fix #74 - ensure table are initialized before flushing them (#75)

942569ea 2021-02-14 10:00 duritong

Merge pull request #73 from Koumbit/global_chain_not_hardcoded

start declaring the 'global' chain with module resources

cf38fe4a 2021-02-14 01:26 Gabriel Filion

create tests for presence of the "global" chain

14156fb6 2021-01-27 06:48 Nacho Barrientos

Add unit test

1d56f209 2021-01-27 06:45 Nacho Barrientos

Fix IP version filter for IPv6 traffic

19908f41 2021-01-18 14:07 mh

add some mail related outgoing rules

e977eb3b 2021-01-18 11:17 Tim Meusel

Merge pull request #62 from glpatcern/master

Added Samba in rules

e743f82e 2021-01-18 08:35 Giuseppe Lo Presti

Made ctdb rule parameterized

8c00b818 2021-01-18 07:37 Nacho Barrientos

Pull up rule regexp to type aliases

1ee2f66b 2021-01-18 06:25 Giuseppe Lo Presti

Added to tests

6a4ffead 2021-01-13 11:10 Nacho Barrientos

Align simplerule and rule rulename requirements

94a80621 2020-12-14 05:07 Steve Traylen

Use Stdlib::Port everywhere in place of Integer

Use Stdlib::Port in place of Integer for ports

Fixes #37

04176b0e 2020-12-13 16:52 mh

switch naming to puppetserver

948ebc98 2020-12-11 02:25 Nacho Barrientos

Prefix custom tables with custom- so they're loaded