cookbooks/firewall/CHANGELOG.md in cloud-mu-3.5.1 vs cookbooks/firewall/CHANGELOG.md in cloud-mu-3.6.3
- old
+ new
@@ -1,295 +1,488 @@
-firewall Cookbook CHANGELOG
-=======================
+# firewall Cookbook CHANGELOG
+
This file is used to list changes made in each version of the firewall cookbook.
+## 6.3.7 - *2024-07-15*
+
+Standardise files with files in sous-chefs/repo-management
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.3.6 - *2024-05-06*
+
+## 6.3.5 - *2024-05-06*
+
+Added support for firewalld zone attribute
+
+## 6.3.4 - *2023-12-21*
+
+## 6.3.3 - *2023-09-28*
+
+## 6.3.2 - *2023-09-04*
+
+## 6.3.1 - *2023-08-30*
+
+## 6.3.0 - *2023-08-01*
+
+- Default to `firewalld` on EL8
+
+## 6.2.18 - *2023-07-31*
+
+Fixes typo in FORWARD chain of nftables default ruleset
+
+## 6.2.17 - *2023-07-10*
+
+## 6.2.16 - *2023-05-17*
+
+## 6.2.15 - *2023-04-26*
+
+Update CI runner to MacOS 12
+
+## 6.2.14 - *2023-04-17*
+
+## 6.2.13 - *2023-04-11*
+
+Fix documentation to pass markdown lint
+
+## 6.2.12 - *2023-04-07*
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.2.11 - *2023-04-04*
+
+Fixed a typo in the readme
+
+## 6.2.10 - *2023-04-01*
+
+## 6.2.9 - *2023-04-01*
+
+## 6.2.8 - *2023-04-01*
+
+Standardise files with files in sous-chefs/repo-management
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.2.7 - *2023-03-02*
+
+## 6.2.6 - *2023-02-23*
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.2.5 - *2023-02-16*
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.2.4 - *2023-02-15*
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.2.3 - *2022-12-08*
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.2.2 - *2022-12-08*
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.2.1 - *2022-12-02*
+
+## 6.2.0 - *2022-12-02*
+
+- Add support for for the description attribute when using UFW
+
+## 6.1.0 - *2022-09-15*
+
+- Add filepath selection based on OS for nftables.conf
+
+## 6.0.2 - *2022-05-15*
+
+Standardise files with files in sous-chefs/repo-management
+
+## 6.0.1 - *2022-05-13*
+
+- Standardise files with files in sous-chefs/repo-management
+
+## 6.0.0 - *2022-05-09*
+
+- Values for firewalld resources must be specified as one would
+ specify them to `firewall-cmd`.
+- Do not use begin/rescue blocks when adding firewalld-objects, as
+ that resulted in errors being logged by firewalld.
+- Various bug fixes that were found along the way.
+
+## 5.1.0 - *2022-05-07*
+
+- Add new providers for firewalld using the dbus-interface of firewalld.
+
+## 5.0.0 - *2022-04-20*
+
+- Add support for nftables
+
+## 4.0.3 - *2022-04-11*
+
+- Use resuable workflows instead of Chef Delivery
+
+## 4.0.2 - *2022-02-17*
+
+- Standardise files with files in sous-chefs/repo-management
+- Remove delivery folder
+
+## 4.0.1 - *2022-01-07*
+
+- Remove extraneous task file that's no longer needed
+
+## 4.0.0 - *2021-09-09*
+
+- Remove dependency on chef-sugar cookbook
+- Bump to require Chef Infra Client >= 15.5 for chef-utils
+- Update metadata and README to Sous Chefs
+
+## 3.0.2 - *2021-08-30*
+
+- Standardise files with files in sous-chefs/repo-management
+
+## 3.0.1 - *2021-07-08*
+
+- Restart netfilter service in iptables mode after updating firewall rules
+
+## 3.0.0 - *2021-06-14*
+
+- Add Amazon Linux support
+- Fix firewall resource actions list
+- First attempt to modernize testing
+- Various Cookstyle fixes
+
+## 2.7.1 - *2021-06-01*
+
+- resolved cookstyle error: libraries/helpers_windows.rb:47:9 convention: `Style/RedundantAssignment`
+- resolved cookstyle error: libraries/helpers_windows.rb:48:9 convention: `Layout/IndentationWidth`
+- resolved cookstyle error: libraries/helpers_windows.rb:49:16 convention: `Layout/ElseAlignment`
+- resolved cookstyle error: libraries/helpers_windows.rb:50:9 convention: `Layout/IndentationWidth`
+- resolved cookstyle error: libraries/helpers_windows.rb:51:16 warning: `Layout/EndAlignment`
+- resolved cookstyle error: libraries/helpers_windows.rb:52:1 convention: `Layout/EmptyLinesAroundMethodBody`
+- resolved cookstyle error: libraries/helpers_windows.rb:52:1 convention: `Layout/TrailingWhitespace`
+- resolved cookstyle error: libraries/provider_firewall_firewalld.rb:30:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_firewalld.rb:54:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_firewalld.rb:114:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_firewalld.rb:136:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_firewalld.rb:149:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables.rb:33:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables.rb:63:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables.rb:112:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables.rb:134:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables_ubuntu.rb:34:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables_ubuntu.rb:67:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables_ubuntu.rb:133:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables_ubuntu.rb:156:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables_ubuntu1404.rb:34:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables_ubuntu1404.rb:67:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables_ubuntu1404.rb:133:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_iptables_ubuntu1404.rb:156:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_rule.rb:24:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_ufw.rb:32:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_ufw.rb:61:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_ufw.rb:102:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_ufw.rb:115:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_windows.rb:29:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_windows.rb:42:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_windows.rb:97:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: libraries/provider_firewall_windows.rb:118:5 refactor: `ChefModernize/ActionMethodInResource`
+- resolved cookstyle error: attributes/iptables.rb:8:54 refactor: `ChefStyle/AttributeKeys`
+- resolved cookstyle error: attributes/iptables.rb:8:54 convention: `Style/StringLiteralsInInterpolation`
+- resolved cookstyle error: attributes/iptables.rb:8:63 refactor: `ChefStyle/AttributeKeys`
+- resolved cookstyle error: attributes/iptables.rb:8:64 convention: `Style/StringLiteralsInInterpolation`
+- resolved cookstyle error: attributes/iptables.rb:9:56 refactor: `ChefStyle/AttributeKeys`
+- resolved cookstyle error: attributes/iptables.rb:9:56 convention: `Style/StringLiteralsInInterpolation`
+- resolved cookstyle error: attributes/iptables.rb:9:65 refactor: `ChefStyle/AttributeKeys`
+- resolved cookstyle error: attributes/iptables.rb:9:66 convention: `Style/StringLiteralsInInterpolation`
+- resolved cookstyle error: attributes/iptables.rb:10:55 refactor: `ChefStyle/AttributeKeys`
+- resolved cookstyle error: attributes/iptables.rb:10:55 convention: `Style/StringLiteralsInInterpolation`
+- resolved cookstyle error: attributes/iptables.rb:10:64 refactor: `ChefStyle/AttributeKeys`
+- resolved cookstyle error: attributes/iptables.rb:10:65 convention: `Style/StringLiteralsInInterpolation`
+
## 2.7.0 (2018-12-19)
- Nominal support for Debian 9 (#202)
## 2.6.5 (2018-07-24)
- use platform_family instead of platform to include all rhels
-v2.6.4 (2018-07-01)
--------------------
-* Stop including chef-sugar when it's >= 4.0.0 (#197)
+## v2.6.4 (2018-07-01)
-v2.6.3 (2018-02-01)
--------------------
-* Fix issue with deep merging of hashes and arrays in recent chef release (#185)
+- Stop including chef-sugar when it's >= 4.0.0 (#197)
-v2.6.2 (2017-06-01)
--------------------
-* Incorrect file checking on Ubuntu, double file write (#173)
-* Added testing on CentOS 6.9
-* Clarify metadata that we're not working on Amazon Linux (#172)
+## v2.6.3 (2018-02-01)
-v2.6.1 (2017-04-21)
--------------------
-* Add recipe to disable firewall (#164)
+- Fix issue with deep merging of hashes and arrays in recent chef release (#185)
-v2.6.0 (2017-04-17)
--------------------
-* Initial Chef 13.x support (#160, #159)
-* Allow loopback and icmp, when enabled (#161)
-* Address various newer rubocop and foodcritic complaints
-* Convert rule provider away from DSL (#159)
+## v2.6.2 (2017-06-01)
-v2.5.4 (2017-02-13)
--------------------
-* Update Test Kitchen platforms to the latest
-* Update copyright headers
-* Allow package options to be passed through to the package install for firewall
-* Define policy for Windows Firewall and use the attributes to set desired policy
+- Incorrect file checking on Ubuntu, double file write (#173)
+- Added testing on CentOS 6.9
+- Clarify metadata that we're not working on Amazon Linux (#172)
-v2.5.3 (2016-10-26)
--------------------
-* Don't show firewall resource as updated (#133)
-* Add :off as a valid logging level (#129)
-* Add support for Ubuntu 16.04 (#149)
+## v2.6.1 (2017-04-21)
-v2.5.2 (2016-06-02)
--------------------
-* Don't issue commands when firewalld isn't active (#140)
-* Install iptables-services on CentOS >= 7 (#131)
-* Update Ruby version on Travis for listen gem
+- Add recipe to disable firewall (#164)
-v2.5.1 (2016-05-31)
--------------------
-* Protocol guard incorrectly prevents "none" protocol type on UFW helper (#128)
-* Fix wrongly ordered conditional for converting ports to strings using port_to_s
-* Fix notify_firewall attribute crashing firewall_rule provider (#130)
-* Add warning if firewall rule opens all traffic (#132)
-* Add ipv6 attribute respect to Ubuntu iptables (#138)
+## v2.6.0 (2017-04-17)
-v2.5.0 (2016-03-08)
--------------------
-* Don't modify parameter for port (#120)
-* Remove a reference to the wrong variable name under windows (#123)
-* Add support for mobile shell default firewall rule (#121)
-* New rubocop rules and style fixes
-* Correct a README.md example for `action :allow`
+- Initial Chef 13.x support (#160, #159)
+- Allow loopback and icmp, when enabled (#161)
+- Address various newer rubocop and foodcritic complaints
+- Convert rule provider away from DSL (#159)
-v2.4.0 (2016-01-28)
--------------------
-* Expose default iptables ruleset so that raw rules can be used in conjunction
-with rulesets for other tables (#101).
+## v2.5.4 (2017-02-13)
-v2.3.1 (2016-01-08)
--------------------
-* Add raw rule support to the ufw firewall provider (#113).
+- Update Test Kitchen platforms to the latest
+- Update copyright headers
+- Allow package options to be passed through to the package install for firewall
+- Define policy for Windows Firewall and use the attributes to set desired policy
-v2.3.0 (2015-12-23)
--------------------
-* Refactor logic so that firewall rules don't add a string rule to the firewall
-when their actions run. Just run the action once on the firewall itself. This is
-designed to prevent partial application of rules (#106)
+## v2.5.3 (2016-10-26)
-* Switch to "enabled" (positive logic) instead of "disabled" (negative logic) on
-the firewall resource. It was difficult to reason with "disabled false" for some
-complicated recipes using firewall downstream. `disabled` is now deprecated.
+- Don't show firewall resource as updated (#133)
+- Add :off as a valid logging level (#129)
+- Add support for Ubuntu 16.04 (#149)
-* Add proper Windows testing and serverspec tests back into this cookbook.
+## v2.5.2 (2016-06-02)
-* Fix the `port_to_s` function so it also works for Windows (#111)
+- Don't issue commands when firewalld isn't active (#140)
+- Install iptables-services on CentOS >= 7 (#131)
+- Update Ruby version on Travis for listen gem
-* Fix typo checking action instead of command in iptables helper (#112)
+## v2.5.1 (2016-05-31)
-* Remove testing ranges of ports on CentOS 5.x, as it's broken there.
+- Protocol guard incorrectly prevents "none" protocol type on UFW helper (#128)
+- Fix wrongly ordered conditional for converting ports to strings using port_to_s
+- Fix notify_firewall attribute crashing firewall_rule provider (#130)
+- Add warning if firewall rule opens all traffic (#132)
+- Add ipv6 attribute respect to Ubuntu iptables (#138)
-v2.2.0 (2015-11-02)
--------------------
+## v2.5.0 (2016-03-08)
+
+- Don't modify parameter for port (#120)
+- Remove a reference to the wrong variable name under windows (#123)
+- Add support for mobile shell default firewall rule (#121)
+- New rubocop rules and style fixes
+- Correct a README.md example for `action :allow`
+
+## v2.4.0 (2016-01-28)
+
+- Expose default iptables ruleset so that raw rules can be used in conjunction with rulesets for other tables (#101).
+
+## v2.3.1 (2016-01-08)
+
+- Add raw rule support to the ufw firewall provider (#113).
+
+## v2.3.0 (2015-12-23)
+
+- Refactor logic so that firewall rules don't add a string rule to the firewall when their actions run. Just run the action once on the firewall itself. This is designed to prevent partial application of rules (#106)
+
+- Switch to "enabled" (positive logic) instead of "disabled" (negative logic) on the firewall resource. It was difficult to reason with "disabled false" for some complicated recipes using firewall downstream. `disabled` is now deprecated.
+
+- Add proper Windows testing and serverspec tests back into this cookbook.
+
+- Fix the `port_to_s` function so it also works for Windows (#111)
+
+- Fix typo checking action instead of command in iptables helper (#112)
+
+- Remove testing ranges of ports on CentOS 5.x, as it's broken there.
+
+## v2.2.0 (2015-11-02)
+
Added permanent as default option for RHEL 7 based systems using firewall-cmd.
This defaults to turned off, but it will be enabled by default on the next major version bump.
-v2.1.0 (2015-10-15)
--------------------
+## v2.1.0 (2015-10-15)
+
Minor feature release.
-* Ensure ICMPv6 is open when `['firewall']['allow_established']` is set to true (the default). ICMPv6 is critical for most IPv6 operations.
-v2.0.5 (2015-10-05)
--------------------
+- Ensure ICMPv6 is open when `['firewall']['allow_established']` is set to true (the default). ICMPv6 is critical for most IPv6 operations.
+
+## v2.0.5 (2015-10-05)
+
Minor bugfix release.
-* Ensure provider filtering always yields 1 and only 1 provider, #97 & #98
-* Documentation update #96
-v2.0.4 (2015-09-23)
--------------------
+- Ensure provider filtering always yields 1 and only 1 provider, #97 & #98
+- Documentation update #96
+
+## v2.0.4 (2015-09-23)
+
Minor bugfix release.
-* Allow override of filter chain policies, #94
-* Fix foodcrtitic and chefspec errors
-v2.0.3 (2015-09-14)
--------------------
+- Allow override of filter chain policies, #94
+- Fix foodcrtitic and chefspec errors
+
+## v2.0.3 (2015-09-14)
+
Minor bugfix release.
-* Fix wrong conditional for firewalld ports, #93
-* Fix ipv6 command logic under iptables, #91
-v2.0.2 (2015-09-08)
--------------------
-* Release with working CI, Chefspec matchers.
+- Fix wrong conditional for firewalld ports, #93
+- Fix ipv6 command logic under iptables, #91
-v2.0.1 (2015-09-01)
--------------------
-* Add default related/established rule for iptables
+## v2.0.2 (2015-09-08)
-v2.0.0 (2015-08-31)
--------------------
-* #84, major rewrite:
- - Allow relative positioning of rules
- - Use delayed notifications to create one firewall ruleset instead of incremental changes
- - Remove poise dependency
-* #82 - Introduce Windows firewall support and test-kitchen platform.
-* #73 - Add the option to disable ipv6 commands on iptables
-* #78 - Use Chef-12 style `provides` to address provider mapping issues
-* Rubocop and foodcritic cleanup
+- Release with working CI, Chefspec matchers.
-v1.6.1 (2015-07-24)
--------------------
-* #80 - Remove an extra space in port range
+## v2.0.1 (2015-09-01)
-v1.6.0 (2015-07-15)
--------------------
-* #68 - Install firewalld when it does not exist
-* #72 - Fix symbol that was a string, breaking comparisons
+- Add default related/established rule for iptables
-v1.5.2 (2015-07-15)
--------------------
-* #75 - Use correct service in iptables save action, Add serverspec tests for iptables suite
+## v2.0.0 (2015-08-31)
-v1.5.1 (2015-07-13)
--------------------
-* #74 - add :save matcher for Chefspec
+- 84, major rewrite
+ - Allow relative positioning of rules
+ - Use delayed notifications to create one firewall ruleset instead of incremental changes
+ - Remove poise dependency
+- #82 - Introduce Windows firewall support and test-kitchen platform
+- #73 - Add the option to disable ipv6 commands on iptables
+- #78 - Use Chef-12 style `provides` to address provider mapping issues
+- Rubocop and foodcritic cleanup
-v1.5.0 (2015-07-06)
--------------------
+## v1.6.1 (2015-07-24)
-* #70 - Add chef service resource to ensure firewall-related services are enabled/disabled
-* - Add testing and support for iptables on ubuntu in iptables provider
+- 80 - Remove an extra space in port range
-v1.4.0 (2015-06-30)
--------------------
+## v1.6.0 (2015-07-15)
-* #69 - Support for CentOS/RHEL 5.x
+- 68 - Install firewalld when it does not exist
+- 72 - Fix symbol that was a string, breaking comparisons
-v1.3.0 (2015-06-09)
--------------------
-* #63 - Add support for protocol numbers
+## v1.5.2 (2015-07-15)
-v1.2.0 (2015-05-28)
--------------------
-* #64 - Support the newer version of poise
+- 75 - Use correct service in iptables save action, Add serverspec tests for iptables suite
-v1.1.2 (2015-05-19)
--------------------
-* #60 - Always add /32 or /128 to ipv4 or ipv6 addresses, respectively.
+## v1.5.1 (2015-07-13)
+
+- 74 - add :save matcher for Chefspec
+
+## v1.5.0 (2015-07-06)
+
+- 70 - Add chef service resource to ensure firewall-related services are enabled/disabled
+ - Add testing and support for iptables on ubuntu in iptables provider
+
+## v1.4.0 (2015-06-30)
+
+- 69 - Support for CentOS/RHEL 5.x
+
+## v1.3.0 (2015-06-09)
+
+- 63 - Add support for protocol numbers
+
+## v1.2.0 (2015-05-28)
+
+- 64 - Support the newer version of poise
+
+## v1.1.2 (2015-05-19)
+
+- 60 - Always add /32 or /128 to ipv4 or ipv6 addresses, respectively
- Make comment quoting optional; iptables on Ubuntu strips quotes on strings without any spaces
-v1.1.1 (2015-05-11)
--------------------
-* #57 - Suppress warning: already initialized constant XXX while Chefspec
+## v1.1.1 (2015-05-11)
-v1.1.0 (2015-04-27)
--------------------
-* #56 - Better ipv6 support for firewalld and iptables
-* #54 - Document raw parameter
+- 57 - Suppress warning: already initialized constant XXX while Chefspec
-v1.0.2 (2015-04-03)
--------------------
-* #52 - Typo in :masquerade action name
+## v1.1.0 (2015-04-27)
-v1.0.1 (2015-03-28)
--------------------
-* #49 - Fix position attribute of firewall_rule providers to be correctly used as a string in commands
+- 56 - Better ipv6 support for firewalld and iptables
+- 54 - Document raw parameter
-v1.0.0 (2015-03-25)
--------------------
-* Major upgrade and rewrite as HWRP using poise
-* Adds support for iptables and firewalld
-* Modernize tests and other files
-* Fix many bugs from ufw defaults to multiport suppot
+## v1.0.2 (2015-04-03)
-v0.11.8 (2014-05-20)
---------------------
-* Corrects issue where on a secondary converge would not distinguish between inbound and outbound rules
+- 52 - Typo in :masquerade action name
+## v1.0.1 (2015-03-28)
-v0.11.6 (2014-02-28)
---------------------
+- 49 - Fix position attribute of firewall_rule providers to be correctly used as a string in commands
+
+## v1.0.0 (2015-03-25)
+
+- Major upgrade and rewrite as HWRP using poise
+- Adds support for iptables and firewalld
+- Modernize tests and other files
+- Fix many bugs from ufw defaults to multiport suppot
+
+## v0.11.8 (2014-05-20)
+
+- Corrects issue where on a secondary converge would not distinguish between inbound and outbound rules
+
+## v0.11.6 (2014-02-28)
+
[COOK-4385] - UFW provider is broken
+## v0.11.4 (2014-02-25)
-v0.11.4 (2014-02-25)
---------------------
[COOK-4140] Only notify when a rule is actually added
+## v0.11.2
-v0.11.2
--------
### Bug
-- **[COOK-3615](https://tickets.opscode.com/browse/COOK-3615)** - Install required UFW package on Debian
-v0.11.0
--------
+- [COOK-3615]: Install required UFW package on Debian
+
+## v0.11.0
+
### Improvement
+
- [COOK-2932]: ufw providers work on debian but cannot be used
-v0.10.2
--------
+## v0.10.2
+
- [COOK-2250] - improve readme
-v0.10.0
-------
+## v0.10.0
+
- [COOK-1234] - allow multiple ports per rule
-v0.9.2
-------
+## v0.9.2
+
- [COOK-1615] - Firewall example docs have incorrect direction syntax
-v0.9.0
-------
+## v0.9.0
+
The default action for firewall LWRP is now :enable, the default action for firewall_rule LWRP is now :reject. This is in line with a "default deny" policy.
- [COOK-1429] - resolve foodcritic warnings
-v0.8.0
-------
+## v0.8.0
+
- refactor all resources and providers into LWRPs
- removed :reset action from firewall resource (couldn't find a good way to make it idempotent)
- removed :logging action from firewall resource...just set desired level via the log_level attribute
-v0.6.0
-------
+## v0.6.0
+
- [COOK-725] Firewall cookbook firewall_rule LWRP needs to support logging attribute.
- Firewall cookbook firewall LWRP needs to support :logging
-v0.5.7
-------
+## v0.5.7
+
- [COOK-696] Firewall cookbook firewall_rule LWRP needs to support interface
- [COOK-697] Firewall cookbook firewall_rule LWRP needs to support the direction for the rules
-v0.5.6
-------
+## v0.5.6
+
- [COOK-695] Firewall cookbook firewall_rule LWRP needs to support destination port
-v0.5.5
-------
+## v0.5.5
+
- [COOK-709] fixed :nothing action for the 'firewall_rule' resource.
-v0.5.4
-------
+## v0.5.4
+
- [COOK-694] added :reject action to the 'firewall_rule' resource.
-v0.5.3
-------
+## v0.5.3
+
- [COOK-698] added :reset action to the 'firewall' resource.
-v0.5.2
-------
-- Add missing 'requires' statements. fixes 'NameError: uninitialized constant' error.
-thanks to Ernad Husremović for the fix.
+## v0.5.2
-v0.5.0
-------
+- Add missing 'requires' statements. fixes 'NameError: uninitialized constant' error. Thanks to Ernad Husremović for the fix.
+
+## v0.5.0
+
- [COOK-686] create firewall and firewall_rule resources
- [COOK-687] create UFW providers for all resources