Puppet Labs Site
Puppet Labs Modules
The Puppet Labs Issue Tracker has Moved:
— 0 open)
: puppetlabs-firewall: Some iptables versions converting CIDR to netmask for source/destination
: firewall: ip6tables/iptables provider keeps appends mask to source and destination causing re-occurring changes
: firewall: User custom Chain not getting created when first rule applies
: firewall: ICMP type 'any'
: When dport changes it's displayed without spaces or separators
: firewall: using 0.0.0.0/0 for source and dest works but causes rules to reload
: firewall: Creating rules across different tables with the same chain name causes "Index of insertion too big" errors
: firewall: Unable to purge unmanaged rules tables other than "filter"
: firewall: exec is not notified when purging rules
: Firewall: vlan interfaces are not supported
: minor documentation bug fix
: tests insuffient - log_prefix and log_level only valid if jump => LOG
: firewall: ordering issue in parse of allvalidchains
: firewall: instructions for setup and using stages is bad
: OUTPUT is a valid chain for the mangle table
: firewall - examples/iptables/readme.pp fails
: Firewall: interface names containing "+" are not supported
: firewall: FATAL errors in iptables-save output creates spurious rule
: firewall-ip6tables provider limit command is incorrect.
: firewall: iptables 1.4 changes how MARK works
: firewall: add more test matrices for travis CI
: puppetlabs-firewall should support gre protocol
: Incorrect ICMP code translation for IPv6
: firewall duplicated rules are not removed
: ip6tables provider is still calling the iptables and iptables-save commands
: puppetlabs-firewall: TCP flags matching support
: Firewall does not support "-j MARK --set-mark xxxx"
: Allow protocol OSPF in puppetlabs-firewall
: Firewall resources should autorequire appropriate Firewallchain
: Add pkt-type handling to puppetlabs-firewall
: Puppet DSL within firewall module should be lint compliant.
: Release 1.0.0
: Firewall: Acceptance tests
© 2006-2012 Jean-Philippe Lang