1) Do we actually need iptables for any reason that isn't a legacy
consideration?
2 & 3) I am in favor of treating custom services as a requirement and plan
accordingly. Many (most, even) of the services are already provided by
either firewalld itself (e.g. vdsm, libvirt) or the 3rd party packages
(e.g. gluster). Some are missing (I've recently created a pull request for
ovirt-imageio to firewalld, for example) and I hope we'll be able to get
all the services to be statically provided (by either firewalld or the
relevant 3rd party packages).
Ideally I think we'd like use statically provided services, and provide the
capability to provide additional services (I'm not a fan of the current
methodology of converting strings into xmls). I don't think we'd want to
limit usage to just statically provided services. (2)
As previously stated, I don't see a technical reason to keep iptables under
consideration. (3)
On Sun, Mar 26, 2017 at 2:57 PM, Yedidyah Bar David <didi(a)redhat.com> wrote:
1. Do we want to support in some version X both iptables and firewalld, or
is it ok to stop support for iptables and support only firewalld without
overlap? If so, do we handle upgrades, and how?
2. Do we want to support custom firewalld xml to be configured on the
host by us? Or is it ok to only support choosing among existing services,
which will need to be added to the host using other means (packaged by
firewalld, packaged by 3rd parties, added manually by users)?
3. Opposite of (2.): Do we want to support firewalld services that are
added to the host using other means (see there)? Obviously we do, but:
If we do, do we still want to support also iptables (see (1.))? And if
so, what do we want to then happen?
(2.) and (3.) are not conflicting, each needs its own answer.
--
Didi