-
-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[4.5.1] detect and filter overlapped IP's on firewalld_ipset #355
Comments
I think that is a RHEL9 thingy rather than a puppet-firewalld thingy. I'm not sure it would be wise (or possible) to implement address range mapping via puppet's DSL. |
I have opened an issue at RHEL. Because on classical ipsets under iptables, there will be no problem. |
Sounds good. |
@jcpunk It looks like, it will be possible to do this with puppet. |
I'm thinking that function set might be suitable for exlib or maybe stdlib? |
Good question. I would suggest, that you open an ticket for it by the maintainer. |
How to reproduce (e.g Puppet code you use)
What are you seeing
An error about return code 136 of "/usr/bin/firewall-cmd --permanent --ipset"
What behaviour did you expect instead
That overlapping IP's are filtered out with an warning.
Output log
Any additional information you'd like to impart
In the sample above, the module must recognize, that 1.1.1.1 are an part of 1.1.1.0/24 and ignore 1.1.1.1
The old iptables ip set simple ignores this, but firewall-cmd on RHEL-9 don't like this.
The text was updated successfully, but these errors were encountered: