-
Notifications
You must be signed in to change notification settings - Fork 1k
Fix net-firewall-policy variable validation #1615
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix net-firewall-policy variable validation #1615
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
While these validations make sense, I think we should let the provider handle them and not duplicate them here.
@sruffilli @ludoo what do you think?
I agree, and it would've been less effort 😄 . I wasn't quite sure why it was there in the first place and I found similar validations in the DNS modules which i'd expect the provider to complain about, so wasn't sure of the approach being taken |
My reasoning for adding validation is
All the rest I tend to delegate to the provider |
If I understand correctly, your first dot point would apply to the For the third dot point I've had a tinker and multiple match variables can coexist in a single rule. The provider handles the case where the minimum requirements for
Based on that @ludoo would you be happy to drop the validation checks for match? |
+1. I'm closing this then @richard-olson thanks for the PR anyway :) |
HI @juliocc unfortunately there are still the original validation rules in place which at the moment block the use of other matches vars. I was thinking we could still use this PR to do this for ingress and egress :
|
Ah sorry about that. I see you already sent another PR, let's keep this one closed. |
Several new options were recently added for firewall policies but the variable validation checks weren't updated to allow these.