firewalld-formula/firewalld
2020-10-24 07:09:06 +01:00
..
files feat(firewalld.conf): support configuration of AllowZoneDrifting 2020-10-24 07:09:06 +01:00
yaml_dump test: verify map output using yaml_dump 2020-04-18 15:29:52 +01:00
backend.sls Refactor backend format, add backward compatibility, simple pkg testing 2018-08-25 19:00:11 -03:00
config.sls Default file permission for firewalld.conf is 644 not 640 (CentOS). Even if I think that "others" don't need to read that, it always shows up as file with non-default permissions from default rpm package in security scans. e.g. "rpm -Va |grep ^.M" or more salty way: "salt '*' pkg.verify" / salt '*' pkg.modified firewalld mode=True; manual fix e.g. rpm --setperms firewalld-*.el7.noarch 2017-12-28 02:45:05 +01:00
defaults.yaml refactor: split default maps into separate files 2020-04-18 15:53:46 +01:00
direct.sls Reload, rather than restart, the FirewallD service 2017-03-11 12:51:12 -07:00
init.sls feat(linux): archlinux support (no osfinger grain) 2019-08-03 14:59:08 +01:00
ipsets.sls update service and zones with more options 2019-04-06 21:40:50 +02:00
map.jinja refactor: split default maps into separate files 2020-04-18 15:53:46 +01:00
osarchmap.yaml refactor: split default maps into separate files 2020-04-18 15:53:46 +01:00
osfamilymap.yaml refactor: split default maps into separate files 2020-04-18 15:53:46 +01:00
osfingermap.yaml refactor: split default maps into separate files 2020-04-18 15:53:46 +01:00
osmap.yaml refactor: split default maps into separate files 2020-04-18 15:53:46 +01:00
services.sls Reload, rather than restart, the FirewallD service 2017-03-11 12:51:12 -07:00
zones.sls Reload, rather than restart, the FirewallD service 2017-03-11 12:51:12 -07:00