.. |
_mapdata
|
test(map): verify map.jinja dump using _mapdata state
|
2020-12-26 08:00:04 +00:00 |
files
|
feat(firewalld.conf): support configuration of AllowZoneDrifting
|
2020-10-24 07:09:06 +01:00 |
backend.sls
|
Refactor backend format, add backward compatibility, simple pkg testing
|
2018-08-25 19:00:11 -03:00 |
config.sls
|
Default file permission for firewalld.conf is 644 not 640 (CentOS). Even if I think that "others" don't need to read that, it always shows up as file with non-default permissions from default rpm package in security scans. e.g. "rpm -Va |grep ^.M" or more salty way: "salt '*' pkg.verify" / salt '*' pkg.modified firewalld mode=True; manual fix e.g. rpm --setperms firewalld-*.el7.noarch
|
2017-12-28 02:45:05 +01:00 |
defaults.yaml
|
refactor: split default maps into separate files
|
2020-04-18 15:53:46 +01:00 |
direct.sls
|
Reload, rather than restart, the FirewallD service
|
2017-03-11 12:51:12 -07:00 |
init.sls
|
feat(linux): archlinux support (no osfinger grain)
|
2019-08-03 14:59:08 +01:00 |
ipsets.sls
|
update service and zones with more options
|
2019-04-06 21:40:50 +02:00 |
map.jinja
|
refactor: split default maps into separate files
|
2020-04-18 15:53:46 +01:00 |
osarchmap.yaml
|
refactor: split default maps into separate files
|
2020-04-18 15:53:46 +01:00 |
osfamilymap.yaml
|
refactor: split default maps into separate files
|
2020-04-18 15:53:46 +01:00 |
osfingermap.yaml
|
refactor: split default maps into separate files
|
2020-04-18 15:53:46 +01:00 |
osmap.yaml
|
refactor: split default maps into separate files
|
2020-04-18 15:53:46 +01:00 |
services.sls
|
Reload, rather than restart, the FirewallD service
|
2017-03-11 12:51:12 -07:00 |
zones.sls
|
Reload, rather than restart, the FirewallD service
|
2017-03-11 12:51:12 -07:00 |