Fixes ordering for ipsets so that ipsets are defined before they are used #373
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request (PR) description
This pull request addresses an ordering issue for ipsets.
Previous behaviour potentially left the running firewall in a state that allowed no traffic to or
from the host. This could be triggered by adding a new ipset.
An earlier commit added autorequires for ipsets that referenced an incorrect type of :ipset and not the correct :firewalld_ipset.
There was an additional ordering issue in the application of the hiera defined configuration in the firewalld class,
where ipsets were being applied after resources that could potentially make use of them.
I have re-ordered the resources in code to ensure that that dependencies can be met.
This Pull Request (PR) fixes the following issues