New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support the the iptables recent module. #206
Add support the the iptables recent module. #206
Conversation
Can one of the admins verify this patch? |
This is failing due to a known issue with rspec-system 1.x. If you rebase and push again, hopefully the unit tests will succeed. |
…support_for_iptables-recent
Rebased as requested. |
Can one of the admins verify this patch? |
Hi, I'm afraid the module marched on and this needs rebasing yet again. Any chance you could redo that for me and we'll get this reviewed. |
Rebased again, as requested. Could someone please take a look. |
Any update on this pull request? Do I need to do anything else? |
Hi, Sorry, I'm just running through PRs at the moment and trying to catch up. I haven't spent a lot of time in the firewall module so I'm always a bit cautious around it. I noticed you munge a bunch of stuff that doesn't take values in this. I was wondering if you've seen #208 ? It extends the "known booleans" stuff to be a bit more flexible. Was I was thinking is if that code passes systems tests that I could merge that in, get you to rebase against master and then replace the munging with the boolean code that already exists so we don't have multiple ways to munge these. Does that make sense? I know this PR has been lingering forever so I wouldn't be surprised if you're fed up of the whole thing. If you're not OK with those changes then I'll try to merge it in and attempt to fix it afterwards, but I'm not as experienced with the code as you are at this point so it'll probably go smoother without my bungling. |
How is this issue different from #120 ? |
Iaslanidis, This does implement --set, --rcheck and friends. In fact, I use this code to implement port knocking. You can supply set, update, rcheck or remove options like so: firewall { 'knock1': |
I was expecting the set, rcheck and so on to be parameters, not attributes. In any case, this is excellent news. Are we getting this into the documentation? |
Conflicts: lib/puppet/provider/firewall/ip6tables.rb
OK, I've rebased again, and changed the code a little to use known_booleans and removed the munging, as requested. Can someone take a look at it. |
I can't comment on the code itself, but it works as expected, and I've successfully adapted port knocking rules using these changes : https://github.com/thias/puppet-rhel/blob/master/manifests/firewall/portknock.pp @stephengrier : Thanks a lot! I hope this gets reviewed and included soon. |
Argh, I hate to be "that guy" again but can you rebase this a final time? I promise to merge it before anything else if you do. |
I also just realized this has no unit tests or acceptance tests. Any chance you can take a look at copying some of the existing unit tests so we can be sure this doesn't break in future. |
Add support for the iptables recent module.