Releases: simp/pupmod-simp-iptables
Releases · simp/pupmod-simp-iptables
Release of 6.1.6
* Thu Nov 01 2018 Jeanne Greulich <jeanne.greulichr@onyxpoint.com> - 6.1.6 - static asset updates for puppet 5 * Thu Oct 11 2018 Nick Miller <nick.miller@onyxpoint.com> - 6.1.6 - Changed $package_ensure from 'latest' to 'installed' - It will also respect `simp_options::package_ensure` * Fri Sep 07 2018 Liz Nemsick <lnemsick.simp@gmail.com> - 6.1.6 - Drop Hiera 4 support
Release of 6.1.5
* Thu May 17 2018 Trevor Vaughan <tvaughan@onyxpoint.com> - 6.1.5 - Perform deep rule comparison on rulesets that are otherwise identical - Remove chances for memory leaks due to the design of iptables_rule - Set init script permissions back to the RPM defaults of 0755
Release of 6.1.4
* Thu May 03 2018 Trevor Vaughan <tvaughan@onyxpoint.com> - 6.1.4 - Remove erroneous native IPTables jump point retention
Release of 6.1.3
* Wed May 02 2018 Trevor Vaughan <tvaughan@onyxpoint.com> - 6.1.3 - Fix issue where a `jump` target went to an empty ruleset and the chain was dropped - Retain all native IPTables jump points by default - Add `==` method for IPTables Rulesets
Release of 6.1.2
* Sun Mar 11 2018 Trevor Vaughan <tvaughan@onyxpoint.com> - 6.1.2 - Added support for OEL 6 and 7 - Added Puppet 5 acceptance tests
Release of 6.1.1
* Mon Jan 22 2018 Trevor Vaughan <tvaughan@onyxpoint.com> - 6.1.1 - Fixed bugs in the chain retention and optimization code that would cause iptables to fail to reload in some situations. * Mon Jan 22 2018 Nick Miller <nick.miller@onyxpoint.com> - 6.1.1 - This commit moves the logic that parses the `iptables::ports` Hash into a define, to make it possible to use the same hash format in other modules without copying code. - There was also a bug where compilation would fail if `proto` was specified in the defaults section of the Hash.
Release of 6.1.0
* Mon Dec 04 2017 Some Dude <7zbayf+sw1l67jjhlbk@sharklasers.com> - 6.1.0-0 - Fixed a bug in the order of the IPTables rules in scanblock module - Previously, IPTables would not block connections from banned IPs that were accessing open ports. * Thu Nov 30 2017 Trevor Vaughan <tvaughan@onyxpoint.com> - 6.1.0-0 - Added the ability to ignore interfaces using the 'ignore' regex array - Fixed issues with ignoring rules and added some optimization - No longer apply IPTables rules in the optimization phase and simply wait for the downstream service to trigger
Release of 6.0.3
* Thu Aug 10 2017 Nick Markowski <nmarkowski@keywcorp.com> - 6.0.3-0 - Updated iptables::listen::tcp_stateful example to pass valid Iptables::DestPort types to dports
Release of 6.0.2
* Wed May 24 2017 Brandon Riden <brandon.riden@onyxpoint.com> - 6.0.2-0 - Added a workaround for Puppet 4.10 type issues - There was a bug in Puppet where all lookup() Hash keys were being converted into Strings even if they were another data type - This is fixed in Puppet > 4.10.2 but this patch will remain for backwards compatibility - Update puppet dependency in metadata.json - Remove OBE pe dependency in metadata.json
6.0.1: (SIMP-1897) Open iptables ports from hiera (#28)
SIMP-1897 #close