c27a83c
Summary: A firewall daemon with D-Bus interface providing a dynamic firewall
73638b8
Name: firewalld
d48dc62
Version: 1.0.5
1a0c21b
Release: 2%{?dist}
e89b2b2
URL:     http://www.firewalld.org
73638b8
License: GPLv2+
893c894
Source0: https://github.com/firewalld/firewalld/releases/download/v%{version}/firewalld-%{version}.tar.gz
3bcc74d
Source1: FedoraServer.xml
3bcc74d
Source2: FedoraWorkstation.xml
a4cd21f
Source3: org.fedoraproject.FirewallD1.desktop.rules.choice
fecd00d
Patch0: fedora-only-MDNS-default.patch
e7b59ed
BuildArch: noarch
991b466
BuildRequires: autoconf
991b466
BuildRequires: automake
73638b8
BuildRequires: desktop-file-utils
73638b8
BuildRequires: gettext
73638b8
BuildRequires: intltool
1f08039
# glib2-devel is needed for gsettings.m4
1f08039
BuildRequires: glib2, glib2-devel
56e929d
BuildRequires: systemd-units
e7b59ed
BuildRequires: docbook-style-xsl
296ea4d
BuildRequires: libxslt
41c649e
BuildRequires: iptables, ebtables, ipset
cb592bb
BuildRequires: python3-devel
8317fa6
BuildRequires: make
b239852
Requires: iptables, ebtables, ipset
8de8565
Suggests: iptables-nft
e7b59ed
Requires(post): systemd
e7b59ed
Requires(preun): systemd
e7b59ed
Requires(postun): systemd
959b2db
Requires: firewalld-filesystem = %{version}-%{release}
75272d6
Requires: python3-firewall  = %{version}-%{release}
27c4930
Obsoletes: firewalld-selinux < 0.4.4.2-2
cb592bb
Conflicts: selinux-policy < 3.14.1-28
0a594a0
Conflicts: cockpit-ws < 173-2
fecd00d
Recommends: libcap-ng-python3
4c9547c
07c43f2
Provides: variant_config(Server)
07c43f2
Provides: variant_config(Workstation)
a4cd21f
Provides: variant_config(KDE Plasma)
07c43f2
4c9547c
# Remove old config subpackages
edff2d5
Obsoletes: firewalld-config-standard <= 0.3.15
edff2d5
Obsoletes: firewalld-config-cloud <= 0.3.15
edff2d5
Obsoletes: firewalld-config-server <= 0.3.15
edff2d5
Obsoletes: firewalld-config-workstation <= 0.3.15
73638b8
73638b8
%description
73638b8
firewalld is a firewall service daemon that provides a dynamic customizable 
c27a83c
firewall with a D-Bus interface.
73638b8
75272d6
%package -n python3-firewall
75272d6
Summary: Python3 bindings for firewalld
a02936d
a02936d
%{?python_provide:%python_provide python3-firewall}
a02936d
40f2321
Obsoletes: python-firewall < 0.5.2-2
40f2321
Obsoletes: python2-firewall < 0.5.2-2
75272d6
Requires: python3-dbus
6daecad
Requires: python3-gobject-base
aed71ab
Requires: python3-nftables
75272d6
75272d6
%description -n python3-firewall
75272d6
Python3 bindings for firewalld.
75272d6
959b2db
%package -n firewalld-filesystem
959b2db
Summary: Firewalld directory layout and rpm macros
959b2db
959b2db
%description -n firewalld-filesystem
959b2db
This package provides directories and rpm macros which
959b2db
are required by other packages that add firewalld configuration files.
959b2db
fecd00d
%package -n firewalld-test
fecd00d
Summary: Firewalld testsuite
fecd00d
fecd00d
%description -n firewalld-test
fecd00d
This package provides the firewalld testsuite.
fecd00d
73638b8
%package -n firewall-applet
73638b8
Summary: Firewall panel applet
73638b8
Requires: %{name} = %{version}-%{release}
ecdf399
Requires: firewall-config = %{version}-%{release}
73638b8
Requires: hicolor-icon-theme
51ae952
Requires: python3-qt5-base
95cd826
Requires: python3-gobject
b42d00a
Requires: libnotify
99b1f46
Requires: NetworkManager-libnm
b239852
Requires: dbus-x11
73638b8
73638b8
%description -n firewall-applet
73638b8
The firewall panel applet provides a status information of firewalld and also 
73638b8
the firewall settings.
73638b8
ecdf399
%package -n firewall-config
ecdf399
Summary: Firewall configuration application
ecdf399
Requires: %{name} = %{version}-%{release}
ecdf399
Requires: hicolor-icon-theme
6dde4a6
Requires: gtk3
95cd826
Requires: python3-gobject
99b1f46
Requires: NetworkManager-libnm
b239852
Requires: dbus-x11
fecd00d
Recommends: polkit
ecdf399
ecdf399
%description -n firewall-config
ecdf399
The firewall configuration application provides an configuration interface for 
ecdf399
firewalld.
73638b8
73638b8
%prep
53a98bc
%autosetup -p1
73638b8
73638b8
%build
620cc87
%configure --enable-sysconfig --enable-rpmmacros PYTHON="%{__python3} %{py3_shbang_opts}"
296ea4d
# Enable the make line if there are patches affecting man pages to
296ea4d
# regenerate them
a3519c4
make %{?_smp_mflags}
75272d6
73638b8
%install
40f2321
make install DESTDIR=%{buildroot}
73638b8
desktop-file-install --delete-original \
e7b59ed
  --dir %{buildroot}%{_sysconfdir}/xdg/autostart \
e7b59ed
  %{buildroot}%{_sysconfdir}/xdg/autostart/firewall-applet.desktop
ecdf399
desktop-file-install --delete-original \
ecdf399
  --dir %{buildroot}%{_datadir}/applications \
ecdf399
  %{buildroot}%{_datadir}/applications/firewall-config.desktop
73638b8
3f62620
install -d -m 755 %{buildroot}%{_prefix}/lib/firewalld/zones/
3bcc74d
install -c -m 644 %{SOURCE1} %{buildroot}%{_prefix}/lib/firewalld/zones/FedoraServer.xml
3bcc74d
install -c -m 644 %{SOURCE2} %{buildroot}%{_prefix}/lib/firewalld/zones/FedoraWorkstation.xml
a4cd21f
install -m 644 -D %{SOURCE3} %{buildroot}%{_datadir}/polkit-1/rules.d/org.fedoraproject.FirewallD1.desktop.rules.choice
3f62620
7ab6dab
# standard firewalld.conf
7ab6dab
mv %{buildroot}%{_sysconfdir}/firewalld/firewalld.conf \
7ab6dab
    %{buildroot}%{_sysconfdir}/firewalld/firewalld-standard.conf
7ab6dab
7ab6dab
# server firewalld.conf
7ab6dab
cp -a %{buildroot}%{_sysconfdir}/firewalld/firewalld-standard.conf \
7ab6dab
    %{buildroot}%{_sysconfdir}/firewalld/firewalld-server.conf
fd6e3eb
sed -i 's|^DefaultZone=.*|DefaultZone=FedoraServer|g' \
7ab6dab
    %{buildroot}%{_sysconfdir}/firewalld/firewalld-server.conf
7ab6dab
7ab6dab
# workstation firewalld.conf
7ab6dab
cp -a %{buildroot}%{_sysconfdir}/firewalld/firewalld-standard.conf \
7ab6dab
    %{buildroot}%{_sysconfdir}/firewalld/firewalld-workstation.conf
fd6e3eb
sed -i 's|^DefaultZone=.*|DefaultZone=FedoraWorkstation|g' \
7ab6dab
    %{buildroot}%{_sysconfdir}/firewalld/firewalld-workstation.conf
7ab6dab
7ab6dab
rm -f %{buildroot}%{_datadir}/polkit-1/actions/org.fedoraproject.FirewallD1.policy
7ab6dab
e9bf51e
# remove file mistakenly added to upstream dist tarball
e9bf51e
rm -f %{buildroot}%{_datadir}/man/man1/firewallctl.1
e9bf51e
73638b8
%find_lang %{name} --all-name
73638b8
73638b8
%post
7fa1b0e
%systemd_post firewalld.service
73638b8
73638b8
%preun
7fa1b0e
%systemd_preun firewalld.service
73638b8
73638b8
%postun
74740e1
%systemd_postun_with_restart firewalld.service
7fa1b0e
4c9547c
%posttrans
82cf3d8
# If we don't yet have a symlink or existing file for firewalld.conf,
82cf3d8
# create it. Note: this will intentionally reset the policykit policy
82cf3d8
# at the same time, so they are in sync.
4c9547c
bc01174
# Import /etc/os-release to get the variant definition
bc01174
. /etc/os-release || :
bc01174
bc01174
if [ ! -e %{_sysconfdir}/firewalld/firewalld.conf ]; then
d651ec2
    case "$VARIANT_ID" in
d651ec2
        server)
4c9547c
            ln -sf firewalld-server.conf %{_sysconfdir}/firewalld/firewalld.conf || :
4c9547c
            ;;
ce530f2
        workstation | silverblue | kde | kinoite)
4c9547c
            ln -sf firewalld-workstation.conf %{_sysconfdir}/firewalld/firewalld.conf || :
4c9547c
            ;;
4c9547c
        *)
4c9547c
            ln -sf firewalld-standard.conf %{_sysconfdir}/firewalld/firewalld.conf
4c9547c
            ;;
bc01174
    esac
bc01174
fi
bc01174
bc01174
if [ ! -e %{_datadir}/polkit-1/actions/org.fedoraproject.FirewallD1.policy ]; then
bc01174
    case "$VARIANT_ID" in
ce530f2
        workstation | silverblue | kde | kinoite)
51ae952
            ln -sf org.fedoraproject.FirewallD1.desktop.policy.choice %{_datadir}/polkit-1/actions/org.fedoraproject.FirewallD1.policy || :
a4cd21f
            ln -sf org.fedoraproject.FirewallD1.desktop.rules.choice  %{_datadir}/polkit-1/rules.d/org.fedoraproject.FirewallD1.rules ||:
bc01174
            ;;
bc01174
        *)
bc01174
            # For all other editions, we'll use the Server polkit policy
51ae952
            ln -sf org.fedoraproject.FirewallD1.server.policy.choice %{_datadir}/polkit-1/actions/org.fedoraproject.FirewallD1.policy || :
a4cd21f
            # no extra rules choice here (yet)
a4cd21f
            rm -f %{_datadir}/polkit-1/rules.d/org.fedoraproject.FirewallD1.rules || :
bc01174
    esac
4c9547c
fi
4c9547c
73638b8
%files -f %{name}.lang
e7b59ed
%doc COPYING README
73638b8
%{_sbindir}/firewalld
73638b8
%{_bindir}/firewall-cmd
a6b084e
%{_bindir}/firewall-offline-cmd
c802b43
%dir %{_datadir}/bash-completion/completions
c802b43
%{_datadir}/bash-completion/completions/firewall-cmd
893c894
%dir %{_datadir}/zsh/site-functions
893c894
%{_datadir}/zsh/site-functions/_firewalld
a4cd21f
%{_datadir}/polkit-1/rules.d/org.fedoraproject.FirewallD1.desktop.rules.choice
a4cd21f
%ghost %config(missingok,noreplace) %{_datadir}/polkit-1/rules.d/org.fedoraproject.FirewallD1.rules
2b8e74f
%{_prefix}/lib/firewalld/icmptypes/*.xml
b239852
%{_prefix}/lib/firewalld/ipsets/README
366584d
%{_prefix}/lib/firewalld/policies/*.xml
2b8e74f
%{_prefix}/lib/firewalld/services/*.xml
2b8e74f
%{_prefix}/lib/firewalld/zones/*.xml
92dff91
%{_prefix}/lib/firewalld/helpers/*.xml
b734914
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld
4c9547c
%ghost %config(noreplace) %{_sysconfdir}/firewalld/firewalld.conf
4c9547c
%config(noreplace) %{_sysconfdir}/firewalld/firewalld-standard.conf
4c9547c
%config(noreplace) %{_sysconfdir}/firewalld/firewalld-server.conf
4c9547c
%config(noreplace) %{_sysconfdir}/firewalld/firewalld-workstation.conf
7b258f3
%config(noreplace) %{_sysconfdir}/firewalld/lockdown-whitelist.xml
e49b9a8
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/helpers
b734914
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/icmptypes
e49b9a8
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/ipsets
366584d
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/policies
b734914
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/services
b734914
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/zones
b734914
%defattr(0644,root,root)
73638b8
%config(noreplace) %{_sysconfdir}/sysconfig/firewalld
56e929d
%{_unitdir}/firewalld.service
893c894
%config(noreplace) %{_datadir}/dbus-1/system.d/FirewallD.conf
51ae952
%{_datadir}/polkit-1/actions/org.fedoraproject.FirewallD1.desktop.policy.choice
51ae952
%{_datadir}/polkit-1/actions/org.fedoraproject.FirewallD1.server.policy.choice
4c9547c
%ghost %{_datadir}/polkit-1/actions/org.fedoraproject.FirewallD1.policy
e7b59ed
%{_mandir}/man1/firewall*cmd*.1*
e7b59ed
%{_mandir}/man1/firewalld*.1*
14ea6c4
%{_mandir}/man5/firewall*.5*
991b466
%{_sysconfdir}/modprobe.d/firewalld-sysctls.conf
0d5db8a
%config(noreplace) %{_sysconfdir}/logrotate.d/firewalld
959b2db
75272d6
%files -n python3-firewall
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/__pycache__
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/config
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/config/__pycache__
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/core
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/core/__pycache__
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/core/io
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/core/io/__pycache__
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/server
75272d6
%attr(0755,root,root) %dir %{python3_sitelib}/firewall/server/__pycache__
75272d6
%{python3_sitelib}/firewall/__pycache__/*.py*
75272d6
%{python3_sitelib}/firewall/*.py*
75272d6
%{python3_sitelib}/firewall/config/*.py*
75272d6
%{python3_sitelib}/firewall/config/__pycache__/*.py*
75272d6
%{python3_sitelib}/firewall/core/*.py*
75272d6
%{python3_sitelib}/firewall/core/__pycache__/*.py*
75272d6
%{python3_sitelib}/firewall/core/io/*.py*
75272d6
%{python3_sitelib}/firewall/core/io/__pycache__/*.py*
75272d6
%{python3_sitelib}/firewall/server/*.py*
75272d6
%{python3_sitelib}/firewall/server/__pycache__/*.py*
75272d6
959b2db
%files -n firewalld-filesystem
959b2db
%dir %{_prefix}/lib/firewalld
e49b9a8
%dir %{_prefix}/lib/firewalld/helpers
959b2db
%dir %{_prefix}/lib/firewalld/icmptypes
e49b9a8
%dir %{_prefix}/lib/firewalld/ipsets
366584d
%dir %{_prefix}/lib/firewalld/policies
959b2db
%dir %{_prefix}/lib/firewalld/services
959b2db
%dir %{_prefix}/lib/firewalld/zones
0b65a30
%{_rpmconfigdir}/macros.d/macros.firewalld
73638b8
fecd00d
%files -n firewalld-test
fecd00d
%dir %{_datadir}/firewalld/testsuite
fecd00d
%{_datadir}/firewalld/testsuite/README
fecd00d
%{_datadir}/firewalld/testsuite/testsuite
fecd00d
%dir %{_datadir}/firewalld/testsuite/integration
fecd00d
%{_datadir}/firewalld/testsuite/integration/testsuite
fecd00d
%dir %{_datadir}/firewalld/testsuite/python
fecd00d
%{_datadir}/firewalld/testsuite/python/firewalld_config.py
fecd00d
%{_datadir}/firewalld/testsuite/python/firewalld_direct.py
fecd00d
%{_datadir}/firewalld/testsuite/python/firewalld_rich.py
fecd00d
%{_datadir}/firewalld/testsuite/python/firewalld_test.py
fecd00d
73638b8
%files -n firewall-applet
73638b8
%{_bindir}/firewall-applet
73638b8
%defattr(0644,root,root)
0d5db8a
%config(noreplace) %{_sysconfdir}/xdg/autostart/firewall-applet.desktop
b239852
%dir %{_sysconfdir}/firewall
0d5db8a
%config(noreplace) %{_sysconfdir}/firewall/applet.conf
73638b8
%{_datadir}/icons/hicolor/*/apps/firewall-applet*.*
e7b59ed
%{_mandir}/man1/firewall-applet*.1*
73638b8
ecdf399
%files -n firewall-config
ecdf399
%{_bindir}/firewall-config
ecdf399
%defattr(0644,root,root)
a7e552c
%{_datadir}/firewalld/firewall-config.glade
7fa1b0e
%{_datadir}/firewalld/gtk3_chooserbutton.py*
6a8dbbc
%{_datadir}/firewalld/gtk3_niceexpander.py*
ecdf399
%{_datadir}/applications/firewall-config.desktop
cab87bd
%{_datadir}/metainfo/firewall-config.appdata.xml
a7e552c
%{_datadir}/icons/hicolor/*/apps/firewall-config*.*
87ffdf6
%{_datadir}/glib-2.0/schemas/org.fedoraproject.FirewallConfig.gschema.xml
e7b59ed
%{_mandir}/man1/firewall-config*.1*
73638b8
73638b8
%changelog
1a0c21b
* Thu Jul 07 2022 Eric Garver <eric@garver.life> - 1.0.5-2
1a0c21b
- enable forward for Fedora zones
1a0c21b
d48dc62
* Wed Jul 06 2022 Eric Garver <eric@garver.life> - 1.0.5-1
d48dc62
- rebase package to v1.0.5
d48dc62
6c2f17e
* Fri Mar 25 2022 Eric Garver <eric@garver.life> - 1.0.4-1
6c2f17e
- rebase package to v1.0.4
6c2f17e
80aafe6
* Mon Feb 28 2022 Eric Garver <eric@garver.life> - 1.0.3-1
80aafe6
- rebase package to v1.0.3
80aafe6
ce530f2
* Mon Sep 27 2021 Timothée Ravier <tim@siosm.fr> - 1.0.1-2
ce530f2
- Add support for Fedora Kinoite
ce530f2
87e2472
* Thu Aug 12 2021 Eric Garver <eric@garver.life> - 1.0.1-1
87e2472
- rebase package to v1.0.1
87e2472
fecd00d
* Fri Jul 23 2021 Eric Garver <eric@garver.life> - 1.0.0-1
fecd00d
- rebase package to v1.0.0
fecd00d
- add subpackage firewalld-test
fecd00d
- remove Requires: python3-decorator, python3-slip-dbus
fecd00d
- add Recommends: polkit, libcap-ng-python3
fecd00d
709124c
* Wed Jul 21 2021 Fedora Release Engineering <releng@fedoraproject.org> - 0.9.3-7
709124c
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
709124c
583ea6a
* Fri Jun 04 2021 Python Maint <python-maint@redhat.com> - 0.9.3-6
583ea6a
- Rebuilt for Python 3.10
583ea6a
a4cd21f
* Fri Mar 26 2021 Rex Dieter <rdieter@fedoraproject.org> - 0.9.3-5
a4cd21f
- apply new policy for desktop only
a4cd21f
- apply desktop policy to "KDE Plasma" variant too
a4cd21f
be056e2
* Tue Mar 23 2021 Rex Dieter <rdieter@fedoraproject.org> - 0.9.3-4
be056e2
- add polkit rule for admin users
be056e2
eb0881c
* Tue Mar 02 2021 Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> - 0.9.3-3
eb0881c
- Rebuilt for updated systemd-rpm-macros
eb0881c
  See https://pagure.io/fesco/issue/2583.
eb0881c
251a14a
* Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 0.9.3-2
251a14a
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
251a14a
f652c4b
* Fri Jan 15 2021 Eric Garver <eric@garver.life> - 0.9.3-1
f652c4b
- rebase package to v0.9.3
f652c4b
3e47f58
* Wed Jan 06 2021 Eric Garver <eric@garver.life> - 0.9.2-2
3e47f58
- Revert "fix(rich): non-printable characters removed from rich rules"
3e47f58
d689baa
* Tue Jan 05 2021 Eric Garver <eric@garver.life> - 0.9.2-1
afadb54
- rebase package to v0.9.2
afadb54
b810f73
* Thu Oct 01 2020 Eric Garver <egarver@garver.life> - 0.9.1-1
b810f73
- rebase package to v0.9.1
b810f73
366584d
* Wed Sep 02 2020 Eric Garver <egarver@garver.life> - 0.9.0-1
366584d
- rebase package to v0.9.0
366584d
b6ab932
* Mon Jul 27 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.8.3-2
b6ab932
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
b6ab932
7a590f5
* Wed Jul 01 2020 Eric Garver <egarver@garver.life> - 0.8.3-1
7a590f5
- rebase package to v0.8.3
7a590f5
a7f1445
* Tue May 26 2020 Miro Hrončok <mhroncok@redhat.com> - 0.8.2-4
a7f1445
- Rebuilt for Python 3.9
a7f1445
620cc87
* Wed May 13 2020 Eric Garver <egarver@garver.life> - 0.8.2-3
620cc87
- use python interpreter flags from rpm macros
620cc87
8aded3b
* Tue Apr 14 2020 Tomas Popela <tpopela@redhat.com> - 0.8.2-2
8aded3b
- Let Silverblue follow the same rules as Workstation (after Silverblue started
8aded3b
  to use fedora-release-silverblue instead of fedora-release-workstation)
8aded3b
d91d046
* Fri Apr 03 2020 Eric Garver <egarver@garver.life> - 0.8.2-1
d91d046
- rebase package to v0.8.2
d91d046
150d4ee
* Thu Jan 30 2020 Eric Garver <egarver@garver.life> - 0.8.1-1
fb83791
- rebase package to v0.8.1
fb83791
1049763
* Tue Jan 28 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.8.0-3
1049763
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
1049763
8de8565
* Wed Jan 15 2020 Phil Sutter <psutter@redhat.com> - 0.8.0-2
8de8565
- Add suggests to propagate iptables-nft
8de8565
aed71ab
* Tue Nov 05 2019 Eric Garver <egarver@garver.life> - 0.8.0-1
aed71ab
- rebase package to v0.8.0
aed71ab
cae7418
* Thu Oct 03 2019 Miro Hrončok <mhroncok@redhat.com> - 0.7.2-2
cae7418
- Rebuilt for Python 3.8.0rc1 (#1748018)
cae7418
873e363
* Wed Oct 02 2019 Eric Garver <egarver@redhat.com> - 0.7.2-1
873e363
- rebase package to v0.7.2
873e363
- remove patch to default to iptables
873e363
9ef9382
* Mon Aug 19 2019 Miro Hrončok <mhroncok@redhat.com> - 0.7.1-3
9ef9382
- Rebuilt for Python 3.8
9ef9382
150b1e5
* Thu Aug 01 2019 Eric Garver <egarver@redhat.com> - 0.7.1-2
150b1e5
- drop Requires: kernel
150b1e5
893c894
* Thu Jul 25 2019 Eric Garver <egarver@redhat.com> - 0.7.1-1
893c894
- rebase package to v0.7.1
893c894
f409ea7
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.6.4-2
f409ea7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
f409ea7
e9bf51e
* Fri Jun 07 2019 Eric Garver <egarver@redhat.com> - 0.6.4-1
e9bf51e
- rebase package to v0.6.4
e9bf51e
43ab8cd
* Thu Jan 31 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.6.3-2
43ab8cd
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
43ab8cd
abbd77e
* Thu Nov 01 2018 Eric Garver <egarver@redhat.com> - 0.6.3-1
abbd77e
- rebase package to v0.6.3
abbd77e
ef8e494
* Fri Sep 21 2018 Eric Garver <egarver@redhat.com> - 0.6.2-1
ef8e494
- rebase package to v0.6.2
ef8e494
- includes patch to fix zone transaction clear
ef8e494
7c611c4
* Fri Aug 10 2018 Eric Garver <egarver@redhat.com> - 0.6.1-2
7c611c4
- default to iptables backend
7c611c4
cab87bd
* Fri Aug 10 2018 Eric Garver <egarver@redhat.com> - 0.6.1-1
cab87bd
- rebase package to v0.6.1
cab87bd
0a594a0
* Sun Jul 29 2018 Eric Garver <egarver@redhat.com> - 0.6.0-2
0a594a0
- Add conflicts for cockpit-ws due to cockpit service definition, rhbz #1609393
0a594a0
cb592bb
* Thu Jul 19 2018 Eric Garver <egarver@redhat.com> - 0.6.0-1
cb592bb
- rebase package to v0.6.0
cb592bb
- simplify spec file
cb592bb
00cd29a
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.3-4
00cd29a
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
00cd29a
53a98bc
* Tue Jul 03 2018 Eric Garver <egarver@redhat.com> - 0.5.3-3
53a98bc
- backport fix for rhbz 1575431
53a98bc
9448377
* Tue Jun 19 2018 Miro Hrončok <mhroncok@redhat.com> - 0.5.3-2
9448377
- Rebuilt for Python 3.7
9448377
18f8c5a
* Wed May 16 2018 Eric Garver <egarver@redhat.com> - 0.5.3-1
18f8c5a
- rebase package to v0.5.3
18f8c5a
40f2321
* Wed Mar 21 2018 Eric Garver <egarver@redhat.com> - 0.5.2-2
40f2321
- remove python2-firewall subpackage
40f2321
7dbe008
* Mon Mar 19 2018 Eric Garver <egarver@redhat.com> - 0.5.2-1
7dbe008
- rebase package to v0.5.2
7dbe008
0ada34b
* Fri Feb 09 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.5.1-2
0ada34b
- Escape macros in %%changelog
0ada34b
991b466
* Wed Feb 07 2018 Eric Garver <egarver@redhat.com> - 0.5.1-1
991b466
- rebase package to v0.5.1
991b466
5f6b622
* Wed Feb 07 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.4.4.5-6
5f6b622
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
5f6b622
51ca746
* Fri Jan 05 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.4.4.5-5
51ca746
- Remove obsolete scriptlets
51ca746
d6aa9a2
* Sun Dec 17 2017 Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> - 0.4.4.5-4
d6aa9a2
- Python 2 binary package renamed to python2-firewall
d6aa9a2
  See https://fedoraproject.org/wiki/FinalizingFedoraSwitchtoPython3
d6aa9a2
3105298
* Mon Jul 31 2017 Thomas Woerner <twoerner@redhat.com> - 0.4.4.5-3
3105298
- Fix spec file for next RHEL versions
3105298
e7c499b
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.4.4.5-2
e7c499b
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
e7c499b
51ae952
* Fri Jun  9 2017 Thomas Woerner <twoerner@redhat.com> - 0.4.4.5-1
51ae952
- Rebase to firewalld-0.4.4.5
51ae952
  http://www.firewalld.org/2017/06/firewalld-0-4-4-5-release
51ae952
  - Fix build from spec
51ae952
  - Fix –remove-service-from-zone option (RHBZ#1438127)
51ae952
  - Support sctp and dccp in ports, source-ports, forward-ports, helpers and
51ae952
    rich rules (RHBZ#1429808)
51ae952
  - firewall-cmd: Fix –{set,get}-{short,description} for zone (RHBZ#1445238)
51ae952
  - firewall.core.ipXtables: Use new wait option for restore commands if
51ae952
    available
51ae952
  - New services for oVirt:
51ae952
    ctdb, ovirt-imageio, ovirt-storageconsole, ovirt-vmconsole and nrpe
51ae952
  - Rename extension for policy choices (server and desktop) to .policy.choice
51ae952
    (RHBZ#1449754)
51ae952
  - D-Bus interfaces: Fix GetAll for interfaces without properties
51ae952
    (RHBZ#1452017)
51ae952
  - Load NAT helpers with conntrack helpers (RHBZ#1452681)
51ae952
  - Translation updates
51ae952
- Additional upstream patches:
51ae952
  - Rich-rule source validation (d69b7cb)
51ae952
  - IPv6 ICMP type only rich-rule fix (cf50bd0)
51ae952
a3519c4
* Mon Mar 27 2017 Thomas Woerner <twoerner@redhat.com> - 0.4.4.4-1
a3519c4
- Rebase to firewalld-0.4.4.4
a3519c4
  http://www.firewalld.org/2017/03/firewalld-0-4-4-4-release
a3519c4
- Drop references to fedorahosted.org from spec file and Makefile.am, use
a3519c4
  archive from github
a3519c4
- Fix inconsistent ordering of rules in INPUT_ZONE_SOURCE (issue#166)
a3519c4
- Fix ipset overloading from /etc/firewalld/ipsets
a3519c4
- Fix permanent rich rules using icmp-type elements (RHBZ#1434594)
a3519c4
- firewall-config: Deactivate edit, remove, .. buttons if there are no items
a3519c4
- Check if ICMP types are supported by kernel before trying to use them
a3519c4
- firewall-config: Show invalid ipset type in the ipset configuration dialog
a3519c4
  in a special label
a3519c4
698a906
* Tue Feb 21 2017 Thomas Woerner <twoerner@redhat.com> - 0.4.4.3-2
698a906
- Fixed ipset overloading, dropped applied check in get_ipset (issue#206)
698a906
e66ea00
* Fri Feb 10 2017 Thomas Woerner <twoerner@redhat.com> - 0.4.4.3-1
e66ea00
- Rebase to firewalld-0.4.4.3
e66ea00
  http://www.firewalld.org/2017/02/firewalld-0-4-4-3-release
e66ea00
- Speed up of large file loading
e66ea00
- Support for more ipset types
e66ea00
- Speed up of adding or removing entries for ipsets from files
e66ea00
- Support icmp-type usage in rich rules
e66ea00
- Support for more icmp types
e66ea00
- Support for h323 conntrack helper
e66ea00
- New services
e66ea00
- Code cleanup and several other bug fixes
e66ea00
- Translation updates
e66ea00
f42660c
* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.4.4.2-4
f42660c
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
f42660c
c2d3d5c
* Tue Dec 13 2016 Stratakis Charalampos <cstratak@redhat.com> - 0.4.4.2-3
c2d3d5c
- Rebuild for Python 3.6
c2d3d5c
27c4930
* Mon Dec  5 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.4.2-2
27c4930
- Dropping firewalld-selinux package again as the required fix made it into
27c4930
  selinux-policy packages for F-23+, updated selinux-policy version conflicts
27c4930
1118c44
* Thu Dec  1 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.4.2-1
1118c44
- New firewalld-selinux sub package delivering the SELinux policy module for
1118c44
  firewalld (RHBZ#1396765) (RHBZ#1394625) (RHBZ#1394578) (RHBZ#1394573)
1118c44
  (RHBZ#1394569)
1118c44
- New firewalld release 0.4.4.2:
1118c44
  - firewalld.spec: Added helpers and ipsets paths to firewalld-filesystem
1118c44
  - firewall.core.fw_nm: create NMClient lazily
1118c44
  - Do not use hard-coded path for modinfo, use autofoo to detect it
1118c44
  - firewall.core.io.ifcfg: Dropped invalid option warning with bad format
1118c44
    string
1118c44
  - firewall.core.io.ifcfg: Properly handle quoted ifcfg values
1118c44
  - firewall.core.fw_zone: Do not reset ZONE with ifdown
1118c44
  - Updated translations from zanata
1118c44
  - firewall-config: Extra grid at bottom to visualize firewalld settings
1118c44
92dff91
* Wed Nov  9 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.4.1-1
92dff91
- firewall-config: Use proper source check in sourceDialog (fixes issue#162)
92dff91
- firewallctl: New support for helpers
92dff91
- Translation updates
92dff91
92dff91
* Fri Oct 28 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.4-1
92dff91
- Fix dist-check
92dff91
- src/Makefile.am: Install new helper files
92dff91
- config/Makefile.am: Install helpers
92dff91
- Merged translations
92dff91
- Updated translations from zanata
92dff91
- firewalld.spec: Adapt requires for PyQt5
92dff91
- firewall-applet: Fix fromUTF8 for python2 PyQt5 usage
92dff91
- firewall-applet: Use PyQt5
92dff91
- firewall-config: New nf_conntrack_select dialog, use nf_conntrack_helpers D-Bus property
92dff91
- shell-completion/bash/firewall-cmd: Updates for helpers and also some fixes
92dff91
- src/tests/firewall-[offline-]cmd_test.sh: New helper tests, adapted module tests for services
92dff91
- doc/xml/seealso.xml: Add firewalld.helper(5) man page
92dff91
- doc/xml/seealso.xml: Add firewalld.ipset(5) man page
92dff91
- Fixed typo in firewalld.ipset(5) man page
92dff91
- Updated firewalld.dbus(5) man page
92dff91
- New firewalld.helper(5) man page
92dff91
- doc/xml/firewall-offline-cmd.xml: Updated firewall-offline-cmd man page
92dff91
- doc/xml/firewall-cmd.xml: Updated firewall-cmd man page
92dff91
- firewall-offline-cmd: New support for helpers
92dff91
- firewall-cmd: New support for helpers
92dff91
- firewall.command: New check_helper_family, check_module and print_helper_info methods
92dff91
- firewall.core.fw_test: Add helpers also to offline backend
92dff91
- firewall.server.config: New AutomaticHelpers property (rw)
92dff91
- firewall.server.config: Fix an dict size changed error for firewall.conf file changes
92dff91
- firewall.server.config: Make LogDenied property readwrite to be consistent
92dff91
- Some renames of nf_conntrack_helper* functions and structures, helpers is a dict
92dff91
- firewall.core.fw: Properly check helper setting in set_automatic_helpers
92dff91
- firewall.errors: Add missing BUILTIN_HELPER error code
92dff91
- No extra interface for helpers needed in runtime, dropped DBUS_INTERFACE_HELPER
92dff91
- firewall.server.firewalld: Drop unused queryHelper D-Bus method
92dff91
- New helpers Q.931 and RAS from nf_conntrack_h323
92dff91
- firewall.core.io.helper: Allow dots in helper names, remove underscore
92dff91
- firewall.core.io.firewalld_conf: Fixed typo in FALLBACK_AUTOMATIC_HELPERS
92dff91
- firewall-[offline-]cmd: Use sys.excepthook to force exception_handler usage always
92dff91
- firewall.core.fw_config: new_X methods should also check builtins
92dff91
- firewall.client: Set helper family to "" if None
92dff91
- firewall.client: Add missing module string to FirewallClientHelperSettings.settings
92dff91
- config/firewalld.conf: Add possible values description for AutomaticHelpers
92dff91
- helpers/amanda.xml: Fix typo in helper module
92dff91
- firewall-config: Added support for helper module setting
92dff91
- firewall.client: Added support for helper module setting
92dff91
- firewall.server.config_helper: Added support for helper module setting
92dff91
- firewall.core.io.service, firewall.server.config_service: Only replace underscore by dash if module start with nf_conntrack_
92dff91
- firewall.core.fw_zone: Use helper module instead of a generated name from helper name
92dff91
- helpers: Added kernel module
92dff91
- firewall.core.io.helper: Add module to helper
92dff91
- firewall-cmd: Removed duplicate --get-ipset-types from help output
92dff91
- firewall.core.fw_zone: Add zone bingings for PREROUTING in the raw table
92dff91
- firewall.core.ipXtables: Add PREROUTING default rules for zones in raw table
92dff91
- firewall-config: New support to handle helpers, new dialogs, new helper tab, ..
92dff91
- config/org.fedoraproject.FirewallConfig.gschema.xml.in: New show-helpers setting
92dff91
- firewall.client: New helper management for runtime and permanent configuration
92dff91
- firewall.server.firewalld: New runtime helper management, new nf_conntrack_helper property
92dff91
- firewall.server.config_service: Fix module name handling (no nf_conntrack_ prefix needed)
92dff91
- firewall.server.config: New permanent D-Bus helper management
92dff91
- New firewall.server.config_helper to provide the permanent D-Bus interface for helpers
92dff91
- firewall.core.fw_zone: Use helpers fw.nf_conntrack_helper for services using helpers
92dff91
- firewall.core.fw: New helper management, new _automatic_helpers and nf_conntrack_helper settings
92dff91
- firewall.core.fw_config: Add support for permanent helper handling
92dff91
- firewall.core.io.service: The module does not need to start with nf_conntrack_ anymore
92dff91
- firewall.functions: New functions to get and set nf_conntrack_helper kernel setting
92dff91
- firewall.core.io.firewalld_conf: New support for AutomaticHelpers setting
92dff91
- firewall.config.dbus: New D-Bus definitions for helpers, new DBUS_INTERFACE_REVISION 12
92dff91
- New firewall.core.fw_helper providing FirewallHelper backend
92dff91
- New firewall.core.helper with HELPER_MAXNAMELEN definition
92dff91
- config/firewalld.conf: New AutomaticHelpers setting with description
92dff91
- firewall.config.__init__.py.in: New helpers variables
92dff91
- firewalld.spec: Add new helpers directory
92dff91
- config/Makefile.am: Install new helpers
92dff91
- New helper configuration files for amanda, ftp, irc, netbios-ns, pptp, sane, sip, snmp and tftp
92dff91
- firewall.core.io.helper: New IO handler for netfilter helpers
92dff91
- firewall.errors: New INVALID_HELPER error code
92dff91
- firewall.core.io.ifcfg: Use .bak for save files
92dff91
- firewall-config: Set internal log_denied setting after changing
92dff91
- firewall.server.config: Copy props before removing items
92dff91
- doc/xml/firewalld.ipset: Replaced icmptype name remains with ipset
92dff91
- firewall.core.fw_zone: Fix LOG rule placement for LogDenied
92dff91
- firewall.command: Use "source-ports" in print_zone_info
92dff91
- firewall.core.logger: Use syslog.openlog() and syslog.closelog()
92dff91
- firewall-[offline-]cmd man pages: Document --path-{zone,icmptype,ipset,service}
92dff91
- firewall-cmd: Enable --path-{zone,icmptype,service} options again
92dff91
- firewall.core.{ipXtables,ebtables}: Copy rule before extracting items in set_rules
92dff91
- firewall.core.fw: Do not abort transaction on failed ipv6_rpfilter rules
92dff91
- config/Makefile.am: Added cfengine, condor-collector and smtp-submission services
92dff91
- Makefile.am: New dist-check used in the archive target
92dff91
- src/Makefile.am: Reordered nobase_dist_python_DATA to be sorted
92dff91
- config/Makefile.am: New CONFIG_FILES variable to contain the config files
92dff91
- Merge pull request #150 from hspaans/master
92dff91
- Merge pull request #146 from canvon/bugfix/spelling
92dff91
- Merge pull request #145 from jcpunk/condor
92dff91
- Command line tools man pages: New section about sequence options and exit codes
92dff91
- Creating service file for SMTP-Submission.
92dff91
- Creating service file for CFEngine.
92dff91
- Fix typo in documentation: iptables mangle table
92dff91
- Only use sort on lists of main items, but not for item properties
92dff91
- firewall.core.io.io_object: import_config should not change ordering of lists
92dff91
- firewall.core.fw_transaction: Load helper modules in FirewallZoneTransaction
92dff91
- firewall.command: Fail with NOT_AUTHORIZED if authorization fails (RHBZ#1368549)
92dff91
- firewall.command: Fix sequence exit code with at least one succeeded item
92dff91
- Add condor collector service
92dff91
- firewall-cmd: Fixed --{get,set}-{description,short} for permanent zones
92dff91
- firewall.command: Do not use error code 254 for {ALREADY,NOT}_ENABLED sequences
92dff91
296ea4d
* Tue Aug 16 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.3.3-1
296ea4d
- Fix CVE-2016-5410: Firewall configuration can be modified by any logged in
296ea4d
  user
296ea4d
- firewall/server/firewalld: Make getXSettings and getLogDenied CONFIG_INFO
296ea4d
- Update AppData configuration file.
296ea4d
- tests/firewalld_rich.py: Use new import structure and FirewallClient classes
296ea4d
- tests/firewalld_direct.py: Use new import structure
296ea4d
- tests: firewalld_direct: Fix assert to check for True instead of False
296ea4d
- tests: firewalld_config: Fix expected value when querying the zone target
296ea4d
- tests: firewalld_config: Use real nf_conntrack modules
0ada34b
- firewalld.spec: Added comment about make call for %%build
296ea4d
- firewall-config: Use also width_request and height_request with default size
296ea4d
- Updated firewall-config screenshot
296ea4d
- firewall-cmd: Fixed typo in help output (RHBZ#1367171)
296ea4d
- test-suite: Ignore stderr to get default zone also for missing firewalld.conf
296ea4d
- firewall.core.logger: Warnings should be printed to stderr per default
296ea4d
- firewall.core.fw_nm: Ignore NetworkManager if NM.Client connect fails
296ea4d
- firewall-cmd, firewallctl: Gracefully fail if SystemBus can not be aquired
296ea4d
- firewall.client: Generate new DBUS_ERROR if SystemBus can not be aquired
296ea4d
- test-suite: Do not fail on ALREADY_ENABLED --add-destination tests
296ea4d
- firewall.command: ALREADY_ENABLED, NOT_ENABLED, ZONE_ALREADY_SET are warnings
296ea4d
- doc/xml/firewalld.dbus.xml: Removed undefined reference
296ea4d
- doc/xml/transform-html.xsl.in: Fixed references in the document
296ea4d
- doc/xml/firewalld.{dbus,zone}.xml: Embed programlisting in para
296ea4d
- doc/xml/transform-html.xsl.in: Enhanced html formatting closer to the man page
296ea4d
- firewall: core: fw_nm: Instantiate the NM client only once
296ea4d
- firewall/core/io/*.py: Do not traceback on a general sax parsing issue
296ea4d
- firewall-offline-cmd: Fix --{add,remove}-entries-from-file
296ea4d
- firewall-cmd: Add missing action to fix --{add,remove}-entries-from-file
296ea4d
- firewall.core.prog: Do not output stderr, but return it in the error case
296ea4d
- firewall.core.io.ifcfg.py: Fix ifcfg file reader and writer (RHBZ#1362171)
296ea4d
- config/firewall.service.in: use KillMode=mixed
296ea4d
- config/firewalld.service.in: use network-pre.target
296ea4d
- firewall-config: Add missing gettext.textdomain call to fix translations
296ea4d
- Add UDP to transmission-client.xml service
296ea4d
- tests/firewall-[offline-]cmd_test.sh: Hide errors and warnings
296ea4d
- firewall.client: Fix ALREADY_ENABLED errors in icmptype destination calls
296ea4d
- firewall.client: Fix NOT_ENABLED errors in icmptype destination calls
296ea4d
- firewall.client: Use {ALREADY,NOT}_ENABLED errors in icmptype destination
296ea4d
  calls
296ea4d
- firewall.command: Add the removed FirewallError handling to the action
296ea4d
  (a17ce50)
296ea4d
- firewall.command: Do not use query methods for sequences and also single
296ea4d
  options
296ea4d
- Add missing information about MAC and ipset sources to man pages and help
296ea4d
  output
296ea4d
- firewalld.spec: Add BuildRequires for libxslt to enable rebuild of man pages
296ea4d
- firewall[-offline]-cmd, firewallctl, firewall.command: Use sys.{stdout,stderr}
296ea4d
- firewallctl: Fix traceback if not connected to firewalld
296ea4d
- firewall-config: Initialize value in on_richRuleDialogElementChooser_clicked
296ea4d
- firewall.command: Convert errors to string for Python3
296ea4d
- firewall.command: Get proper firewall error code from D-BusExceptions
296ea4d
- firewall-cmd: Fixed traceback without args
296ea4d
- Add missing service files to Makefile.am
296ea4d
- shell-completion: Add shell completion support for
296ea4d
  --{get,set}--{description,short}
296ea4d
- Updated RHEL-7 selinux-policy and squid conflict
296ea4d
f03f262
* Tue Jul 19 2016 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.4.3.2-2
f03f262
- https://fedoraproject.org/wiki/Changes/Automatic_Provides_for_Python_RPM_Packages
f03f262
ffe18e7
* Mon Jul  4 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.3.2-1
ffe18e7
- Fix regression with unavailable optional commands
ffe18e7
- All missing backend messages should be warnings
ffe18e7
- Individual calls for missing restore commands
ffe18e7
- Only one authenticate call for add and remove options and also sequences
ffe18e7
- New service RH-Satellite-6
ffe18e7
- Fixed selinux-policy conflict version for RHEL-7
ffe18e7
ebe2f35
* Wed Jun 29 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.3.1-2
ebe2f35
- Fixed selinux-policy conflict version for Fedora 24
ebe2f35
99b1f46
* Tue Jun 28 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.3.1-1
99b1f46
- New firewalld release 0.4.3.1
99b1f46
- firewall.command: Fix python3 DBusException message not interable error
99b1f46
- src/Makefile.am: Fix path in firewall-[offline-]cmd_test.sh while installing
99b1f46
- firewallctl: Do not trace back on list command without further arguments
99b1f46
- firewallctl (man1): Added remaining sections zone, service, ..
99b1f46
- firewallctl: Added runtime-to-permanent, interface and source parser,
99b1f46
  IndividualCalls setting
99b1f46
- firewall.server.config: Allow to set IndividualCalls property in config
99b1f46
  interface
99b1f46
- Fix missing icmp rules for some zones
99b1f46
- runProg: Fix issue with running programs
99b1f46
- firewall-offline-cmd: Fix issues with missing system-config-firewall
99b1f46
- firewall.core.ipXtables: Split up source and dest addresses for transaction
99b1f46
- firewall.server.config: Log error in case of loading malformed files in
99b1f46
  watcher
99b1f46
- Install and package the firewallctl man page
99b1f46
- New firewallctl utility (RHBZ#1147959)
99b1f46
- doc.xml.seealso: Show firewalld.dbus in See Also sections
99b1f46
- firewall.core.fw_config: Create backup on zone, service, ipset and icmptype
99b1f46
  removal (RHBZ#1339251)
99b1f46
- {zone,service,ipset,icmptype}_writer: Do not fail on failed backup
99b1f46
- firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd
99b1f46
- firewall-cmd: Dropped duplicate setType call in --new-ipset
99b1f46
- radius service: Support also tcp ports (RBZ#1219717)
99b1f46
- xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset
99b1f46
  sources
99b1f46
- config.xmlschema.service.xsd: Fix service destination conflicts
99b1f46
  (RHBZ#1296573)
99b1f46
- firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg
99b1f46
- firewall.command: Only print summary and description in print_X_info with
99b1f46
  verbose
99b1f46
- firewall.command: print_msg should be able to print empty lines
99b1f46
- firewall-config: No processing of runtime passthroughs signals in permanent
99b1f46
- Landspace.io fixes and pylint calm downs
99b1f46
- firewall.core.io.zone: Add zone_reader and zone_writer to __all__, pylint
99b1f46
  fixes
99b1f46
- firewall-config: Fixed titles of command and context dialogs, also entry
99b1f46
  lenths
99b1f46
- firewall-config: pylint calm downs
99b1f46
- firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit
99b1f46
- firewall-config: Use self.active_zoens in conf_zone_added_cb
99b1f46
- firewall.command: New parse_port, extended parse methods with more checks
99b1f46
- firewall.command: Fixed parse_port to use the separator in the split call
99b1f46
- firewall.command: New [de]activate_exception_handler, raise error in parse_X
99b1f46
- services ha: Allow corosync-qnetd port
99b1f46
- firewall-applet: Support for kde5-nm-connection-editor
99b1f46
- tests/firewall-offline-cmd_test.sh: New tests for service and icmptype
99b1f46
  modifications
99b1f46
- firewall-offline-cmd: Use FirewallCommand for simplification and sequence
99b1f46
  options
99b1f46
- tests/firewall-cmd_test.sh: New tests for service and icmptype modifications
99b1f46
- firewall-cmd: Fixed set, remove and query destination options for services
99b1f46
- firewall.core.io.service: Source ports have not been checked in _check_config
99b1f46
- firewall.core.fw_zone: Method check_source_port is not used, removed
99b1f46
- firewall.core.base: Added default to ZONE_TARGETS
99b1f46
- firewall.client: Allow to remove ipv:address pair for service destinations
99b1f46
- tests/firewall-offline-cmd_test.sh: There is no timeout option in permanent
99b1f46
- firewall-cmd: Landscape.io fixes, pylint calm downs
99b1f46
- firewall-cmd: Use FirewallCommand for simplification and sequence options
99b1f46
- firewall.command: New FirewallCommand for command line client simplification
99b1f46
- New services: kshell, rsh, ganglia-master, ganglia-client
99b1f46
- firewalld: Cleanup of unused imports, do not translate some deamon messages
99b1f46
- firewalld: With fd close interation in runProg, it is not needed here anymore
99b1f46
- firewall.core.prog: Add fd close iteration to runProg
99b1f46
- firewall.core.fw_nm: Hide NM typelib import, new nm_get_dbus_interface
99b1f46
  function
99b1f46
- firewalld.spec: Require NetworkManager-libnm instead of NetworkManager-glib
99b1f46
- firewall-config: New add/remove ipset entries from file, remove all entries
99b1f46
- firewall-applet: Fix tooltip after applet start with connection to firewalld
99b1f46
- firewall-config: Select new zone, service or icmptype if the view was empty
99b1f46
- firewalld.spec: Added build requires for iptables, ebtables and ipset
99b1f46
- Adding nf_conntrack_sip module to the service SIP
99b1f46
- firewall: core: fw_ifcfg: Quickly return if ifcfg directory does not exist
99b1f46
- Drop unneeded python shebangs
99b1f46
- Translation updates
99b1f46
6a8dbbc
* Mon May 30 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.2-1
6a8dbbc
- New module to search for and change ifcfg files for interfaces not under
6a8dbbc
  control of NM
6a8dbbc
- firewall_config: Enhanced messages in status bar
6a8dbbc
- firewall-config: New message window as overlay if not connected
6a8dbbc
- firewall-config: Fix sentivity of option, view menus and main paned if not
6a8dbbc
  connected
6a8dbbc
- firewall-applet: Quit on SIGINT (Ctrl-C), reduced D-Bus calls, some cleanup
6a8dbbc
- firewall-[offline]cmd: Show target in zone information
6a8dbbc
- D-Bus: Completed masquerade methods in FirewallClientZoneSettings
6a8dbbc
- Fixed log-denied rules for icmp-blocks
6a8dbbc
- Keep sorting of interfaces, services, icmp-blocks and other settings in zones
6a8dbbc
- Fixed runtime-to-permanent not to save interfaces under control of NM
6a8dbbc
- New icmp-block-inversion flag in the zones
6a8dbbc
- ICMP type filtering in the zones
6a8dbbc
- New services: sip, sips, managesieve
6a8dbbc
- rich rules: Allow destination action (RHBZ#1163428)
6a8dbbc
- firewall-offline-cmd: New option -q/--quiet
6a8dbbc
- firewall-[offline-]cmd: New --add-[zone,service,ipset,icmptype]-from-file
6a8dbbc
- firewall-[offline-]cmd: Fix option for setting the destination address
6a8dbbc
- firewall-config: Fixed resizing behaviour
6a8dbbc
- New transaction model for speed ups in start, restart, stop and other actions
6a8dbbc
- firewall-cmd: New options --load{zone,service,ipset,icmptype}-defaults
6a8dbbc
- Fixed memory leak in dbus_introspection_add_properties
6a8dbbc
- Landscape.io fixes, pylint calm downs
6a8dbbc
- New D-Bus getXnames methods to speed up firewall-config and firewall-cmd
6a8dbbc
- ebtables-restore: No support for COMMIT command
6a8dbbc
- Source port support in services, zones and rich rules
6a8dbbc
- firewall-offline-cmd: Added --{add,remove}-entries-from-file for ipsets
6a8dbbc
- firewall-config: New active bindings side bar for simple binding changes
6a8dbbc
- Reworked NetworkManager module
6a8dbbc
- Proper default zone handling for NM connections
6a8dbbc
- Try to set zone binding with NM if interface is under control of NM
6a8dbbc
- Code cleanup and bug fixes
6a8dbbc
- Include test suite in the release and install in /usr/share/firewalld/tests
6a8dbbc
- New Travis-CI configuration file
6a8dbbc
- Fixed more broken frensh translations
6a8dbbc
- Translation updates
6a8dbbc
07c6568
* Mon May  9 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.1.2-2
07c6568
- Fixed ebtables-restore does not support the COMMIT command issue
07c6568
a81efa3
* Wed Apr 20 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.1.2-1
a81efa3
- Fixed translations with python3
a81efa3
- Fixed exception for failed NM import, new doc string
a81efa3
- Make ipsets visible per default in firewall-config
a81efa3
- Install new fw_nm module
a81efa3
- Do not fail if log file could not be opened
a81efa3
- Fixed broken fr translation
a81efa3
59f8983
* Tue Apr 19 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.1-1
59f8983
- Enhancements of ipset handling
59f8983
  - No cleanup of ipsets using timeouts while reloading
59f8983
  - Only destroy conflicting ipsets
59f8983
  - Only use ipset types supported by the system
59f8983
  - Add and remove several ipset entries in one call using a file
59f8983
- Reduce time frame where builtin chains are on policy DROP while reloading
59f8983
- Include descriptions in --info-X calls
59f8983
- Command line interface support to get and alter descriptions of zones,
59f8983
  services, ipsets and icmptypes with permanent option
59f8983
- Properly watch changes in combined zones
59f8983
- Fix logging in rich rule forward rules
59f8983
- Transformed direct.passthrough errors into warnings
59f8983
- Rework of import structures
59f8983
- Reduced calls to get ids for port and protocol names (RHBZ#1305434)
59f8983
- Build and installation fixes by Markos Chandras
59f8983
- Provide D-Bus properties in introspection data
59f8983
- Fix for flaws found by landscape.io
59f8983
- Fix for repeated SUGHUP
59f8983
- New NetworkManager module to get and set zones of connections, used in
59f8983
  firewall-applet and firewall-config
59f8983
- configure: Autodetect backend tools ({ip,ip6,eb}tables{,-restore}, ipset)
59f8983
- Code cleanups
59f8983
- Bug fixes
59f8983
1eb3256
* Mon Feb 22 2016 Jiri Popelka <jpopelka@redhat.com> - 0.4.0-4
1eb3256
- Revert one commit to temporary work-around RHBZ#1309754
1eb3256
4f8a6cb
* Mon Feb 08 2016 Jiri Popelka <jpopelka@redhat.com> - 0.4.0-3
e253f94
- Make sure tempdir is created even in offline mode. (RHBZ#1305175)
e253f94
0d988a0
* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 0.4.0-2
0d988a0
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
0d988a0
b239852
* Mon Feb  1 2016 Thomas Woerner <twoerner@redhat.com> - 0.4.0-1
b239852
- Version 0.4.0
b239852
  - Speed ups
b239852
  - ipset support
b239852
  - MAC address support
b239852
  - Log of denied packets
b239852
  - Mark action in rich rules
b239852
  - Enhanced alteration of config files with command line tools
b239852
  - Use of zone chains in direct interface
b239852
  - firewall-applet enhancement
b239852
  - New services: ceph-mon, ceph, docker-registry, imap, pop3, pulseaudio,
b239852
    smtps, snmptrap, snmp, syslog-tls and syslog
b239852
  - Several bug fixes
b239852
  - Code optimizations
b239852
01f44ea
* Tue Nov 10 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.3.14.2-5
01f44ea
- Rebuilt for https://fedoraproject.org/wiki/Changes/python3.5
01f44ea
edff2d5
* Wed Jul 22 2015 Adam Williamson <awilliam@redhat.com> - 0.3.14.2-4
edff2d5
- bump versions on old config package obsoletes (f21 is on 0.3.14 now)
edff2d5
6daecad
* Mon Jul 13 2015 Thomas Woerner <twoerner@redhat.com> - 0.3.14.2-3
6daecad
- Require python3-gobject-base for fedora >= 23 and rhel >= 8 (RHBZ#1242076)
6daecad
- Fix rhel defines: No python3 for rhel-7
6daecad
400c17b
* Thu Jun 18 2015 Thomas Woerner <twoerner@redhat.com> - 0.3.14.2-2
400c17b
- Fixed 'pid_file' referenced before assignment (RHBZ#1233232)
400c17b
a852a77
* Wed Jun 17 2015 Thomas Woerner <twoerner@redhat.com> - 0.3.14.2-1
a852a77
- reunification of the firewalld spec files for all Fedora releases
a852a77
- fix dependencies for -applet and -config: use_python3 is the proper switch
a852a77
  not with_python3 (RHBZ#1232493)
a852a77
- firewalld.spec:
a852a77
  - fixed requirements for -applet and -config
a852a77
- man pages:
a852a77
  - adapted firewall-applet man page to new version
a852a77
- firewall-applet:
a852a77
  - Only honour active connections for zone changes
a852a77
  - Change QSettings path and file names
a852a77
- firewall-config:
a852a77
  - Only honour active connections for zone changes in the “Change Zones of Connections” menu
a852a77
- Translations:
a852a77
  - updated translations
a852a77
  - marked translations for “Connections” for review
a852a77
3467da0
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.3.14.1-3
3467da0
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
3467da0
bc01174
* Tue Jun 16 2015 Stephen Gallagher <sgallagh@redhat.com> 0.3.14.1-2
bc01174
- Fix issue with missing polkit policy when installing firewalld on
bc01174
  Cloud Edition.
bc01174
95cd826
* Fri Jun 12 2015 Thomas Woerner <twoerner@redhat.com> - 0.3.14.1-1
95cd826
- firewall-applet
95cd826
  - do not use isSystemTrayAvailable check to fix KDE5 startup
95cd826
  - dropped gtk applet remain: org.fedoraproject.FirewallApplet.gschema.xml
95cd826
95cd826
* Fri Jun 12 2015 Thomas Woerner <twoerner@redhat.com> - 0.3.14-1
95cd826
- renamed python2-firewall to python-firewall
95cd826
- fixed requirements for GUI parts with Python3
95cd826
- dropped upstream merged python3 patch
95cd826
- firewalld:
95cd826
  - print real zone names in error messages
95cd826
  - iptables 1.4.21 does not accept limits of 1/day, minimum is 2/day now
95cd826
  - rate limit fix for rich rules
95cd826
  - fix readdition of removed permanent direct settings
95cd826
  - adaption of the polkit domains to use PK_ACTION_DIRECT_INFO
95cd826
  - fixed two minor Python3 issues in firewall.core.io.direct
95cd826
  - fixed use of fallback configuration values
95cd826
  - fixed use without firewalld.conf
95cd826
  - firewalld main restructureization
95cd826
  - IPv6_rpfilter now also available as a property on D-Bus in the config interface
95cd826
  - fixed wait option use for ipXtables
95cd826
  - added --concurrent support for ebtables
95cd826
  - richLanguage: allow masquerading with destination
95cd826
  - richLanguage: limit masquerading forward rule to new connections
95cd826
  - ipXtables: No dns lookups in available_tables and _detect_wait_option
95cd826
  - full ebtables support: start, stop, reload, panic mode, direct chains and rules
95cd826
  - fix for reload with direct rules
95cd826
  - fix or flaws found by landscape.io
95cd826
  - pid file handling fixes in case of pid file removal
95cd826
  - fix for client issue in case of a dbus NoReply error
95cd826
- configuration
95cd826
  - new services: dropbox-lansync, ptp
95cd826
  - new icmptypes: timestamp-request, timestamp-reply
95cd826
- man pages:
95cd826
  - firewalld.zones(5): fixed typos
95cd826
  - firewalld.conf(5): Fixed wrong reference to firewalld.lockdown-whitelist page
95cd826
- firewall-applet:
95cd826
  - new version using Qt4 fixing several issues with the Gtk version
95cd826
- spec file:
95cd826
  - enabled Python3 support: new backends python-firewall and python3-firewall
95cd826
  - some cleanup
95cd826
- git:
95cd826
  - migrated to github
95cd826
- translations:
95cd826
  - migrated to zanata
95cd826
- build environment:
95cd826
  - no need for autoconf-2.69, 2.68 is sufficient
95cd826
d651ec2
* Thu May 07 2015 Stephen Gallagher <sgallagh@redhat.com> 0.3.13-7
d651ec2
- Use VARIANT_ID instead of VARIANT for making decisions
d651ec2
8aec798
* Thu Apr 16 2015 Stephen Gallagher <sgallagh@redhat.com> 0.3.13-6
8aec798
- Switch to using $VARIANT directly from /etc/os-release
8aec798
82cf3d8
* Fri Mar 13 2015 Stephen Gallagher <sgallagh@redhat.com> 0.3.13-5
82cf3d8
- Fix bugs with posttrans
82cf3d8
- Remove nonexistent fedora-cloud.conf symlink
82cf3d8
4c9547c
* Fri Mar 13 2015 Stephen Gallagher <sgallagh@redhat.com> 0.3.13-4
4c9547c
- Remove per-edition config files
4c9547c
- Decide on default configuration based on /etc/os-release
4c9547c
e24f6cf
* Mon Feb 23 2015 Jiri Popelka <jpopelka@redhat.com> - 0.3.13-3
e24f6cf
- use python3 bindings on fedora >=23
e24f6cf
75272d6
*  Wed Jan 28 2015 Thomas Woerner <twoerner@redhat.com> - 0.3.13-2
75272d6
- enable python2 and python3 bindings for fedora >= 20 and rhel >= 7
75272d6
- use python3 bindings on fedora >= 22 and rhel >= 8 for firewalld,
75272d6
  firewall-config and firewall-applet
75272d6
959b2db
* Thu Dec 04 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.13-1
959b2db
- firewalld:
959b2db
  - ipXtables: use -w or -w2 if supported (RHBZ#1161745, RHBZ#1151067)
959b2db
  - DROP INVALID packets (RHBZ#1169837)
959b2db
  - don't use ipv6header for protocol matching. (RHBZ#1065565)
959b2db
  - removeAllPassthroughs(): remove passthroughs in reverse order (RHBZ#1167100)
959b2db
  - fix config.service.removeDestination() (RHBZ#1164584)
959b2db
- firewall-config:
959b2db
  - portProtoDialog: other protocol excludes port number/range
959b2db
  - better fix for updating zoneStore also in update_active_zones()
959b2db
  - fix typo in menu
959b2db
- configuration:
959b2db
  - new services: tinc, vdsm, mosh, iscsi-target, rsyncd
959b2db
  - ship and install XML Schema files. (#8)
959b2db
- man pages:
959b2db
  - firewalld.dbus, firewalld.direct, firewalld, firewall-cmd
959b2db
- spec file:
959b2db
  - filesystem subpackage
959b2db
  - make dirs&files in /usr/lib/ world-readable (RHBZ#915988)
959b2db
e89b2b2
* Tue Oct 14 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.12-1
e89b2b2
- firewalld:
e89b2b2
  - new runtimeToPermanent and tracked passsthrough support
e89b2b2
  - make permanent D-Bus interfaces more fine grained like the runtime versions (RHBZ#1127706)
e89b2b2
  - richLanguage: allow using destination with forward-port
e89b2b2
  - Rich_Rule.check(): action can't be used with icmp-block/forward-port/masquerade
e89b2b2
  - fixed Python specific D-Bus exception (RHBZ#1132441)
e89b2b2
- firewall-cmd:
e89b2b2
  - new --runtime-to-permanent to create permanent from runtime configuration
e89b2b2
  - use new D-Bus methods for permanent changes
e89b2b2
  - show target REJECT instead of %%REJECT%% (RHBZ#1058794)
e89b2b2
  - --direct: make fail messages consistent (RHBZ#1141835)
e89b2b2
- firewall-config:
e89b2b2
  - richRuleDialog - OK button tooltip indicates problem
e89b2b2
  - use new D-Bus methods for permanent changes
e89b2b2
  - show target REJECT instead of %%REJECT%% (RHBZ#1058794)
e89b2b2
  - update "Change Zones of Connections" menu on default zone change (RHBZ#11120212)
e89b2b2
  - fixed rename of zones, services and icmptypes to not create new entry (RBHZ#1131064)
e89b2b2
- configuration:
e89b2b2
  - new service for Squid HTTP proxy server
e89b2b2
  - new service for Kerberos admin server
e89b2b2
  - new services for syslog and syslog-tls
e89b2b2
  - new services for SNMP and SNMP traps
e89b2b2
  - add Keywords to .desktop to improve software searchability
e89b2b2
- docs:
e89b2b2
  - updated translations
e89b2b2
  - firewalld.richlanguage: improvements suggested by Rufe Glick
e89b2b2
  - firewalld.dbus: various improvements
e89b2b2
  - firewalld.zone: better description of Limit tag
e89b2b2
  - mention new homepage everywhere
e89b2b2
1c3b179
* Wed Aug 27 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.11-3
1c3b179
- Quiet systemctl if cups-browsed.service is not installed
1c3b179
b42d00a
* Mon Aug 25 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.11-2
b42d00a
- add few Requires to spec (RHBZ#1133167)
b42d00a
0b65a30
* Wed Aug 20 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.11-1
0b65a30
- firewalld:
0b65a30
  - improve error messages
0b65a30
  - check built-in chains in direct chain handling functions (RHBZ#1120619)
0b65a30
  - dbus_to_python() check whether input is of expected type (RHBZ#1122018)
0b65a30
  - handle negative timeout values (RHBZ#1124476)
0b65a30
  - warn when Command/Uid/Use/Context already in lockdown whitelist (RHBZ#1126405)
0b65a30
  - make --lockdown-{on,off} work again (RHBZ#1111573)
0b65a30
- firewall-cmd:
0b65a30
  - --timeout now accepts time units (RHBZ#994044)
0b65a30
- firewall-config:
0b65a30
  - show active (not default) zones in bold (RHBZ#993655)
0b65a30
- configuration:
0b65a30
  - remove ipp-client service from all zones (RHBZ#1105639).
0b65a30
  - fallbacks for missing values in firewalld.conf
0b65a30
  - create missing dirs under /etc if needed
0b65a30
  - add -Es to python command in lockdown-whitelist.xml (RHBZ#1099065)
0b65a30
- docs:
0b65a30
  - 'direct' methods concern only chains/rules added via 'direct' (RHBZ#1120619)
0b65a30
  - --remove-[interface/source] don't need a zone to be specified (RHBZ#1125851)
0b65a30
  - various fixes in firewalld.zone(5), firewalld.dbus(5), firewalld.direct(5)
0b65a30
- others:
0b65a30
  - rpm macros for easier packaging of e.g. services
0b65a30
fd6e3eb
* Tue Jul 22 2014 Thomas Woerner <twoerner@redhat.com> - 0.3.10-5
fd6e3eb
- Fixed wrong default zone names for server and workstation (RHBZ#1120296)
fd6e3eb
3bcc74d
* Tue Jul  8 2014 Thomas Woerner <twoerner@redhat.com> - 0.3.10-4
3bcc74d
- renamed fedora specific zones to FedoraServer and FedoraWorkstation for 
3bcc74d
  zone name limitations (length and allowed chars)
3bcc74d
7ab6dab
* Mon Jul  7 2014 Thomas Woerner <twoerner@redhat.com> - 0.3.10-3
7ab6dab
- New support for Fedora per-product configuration settings for Fedora.next
7ab6dab
  https://fedoraproject.org/wiki/Per-Product_Configuration_Packaging_Draft
3f62620
- Added Fedora server zone (RHBZ#1110711)
3f62620
- Added Fedora workstation zone(RHBZ#1113775)
7ab6dab
f51ba28
* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.3.10-2
f51ba28
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
f51ba28
c27a83c
* Wed May 28 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.10-1
c27a83c
- new services: freeipa-*, puppermaster, amanda-k5, synergy,
c27a83c
                xmpp-*, tor, privoxy, sane
c27a83c
- do not use at_console in D-Bus policies (RHBZ#1094745)
c27a83c
- apply all rich rules for non-default targets
c27a83c
- AppData file (RHBZ#1094754)
c27a83c
- separate Polkit actions for desktop & server (RHBZ#1091068)
c27a83c
- sanitize missing ip6t_rpfilter (RHBZ#1074427)
c27a83c
- firewall/core/io/*: few improvements (RHBZ#1065738)
c27a83c
- no load failed error for absent direct.xml file
c27a83c
- new DBUS_INTERFACE.getZoneSettings to get all run-time zone settings
c27a83c
- fixed creation and deletion of zones, services and icmptypes over D-Bus signals
c27a83c
- FirewallClientZoneSettings: Set proper default target
c27a83c
- if Python2 then encode strings from sax parser (RHBZ#1059104, RHBZ#1058853)
c27a83c
- firewall-cmd:
c27a83c
  - don't colour output of query commands (RHBZ#1097841)
c27a83c
  - use "default" instead of {chain}_{zone} (RHBZ#1075675)
c27a83c
  - New --get-target and --set-target
c27a83c
  - Create and remove permanent zones, services and icmptypes
c27a83c
- firewall-config:
c27a83c
  - Adding services and icmptypes resulted in duplicates in UI
c27a83c
  - Use left button menu of -applet in Option menu
c27a83c
- firewall-offline-cmd: same functionality as 'firewall-cmd --permanent'
c27a83c
- firewall-applet: ZoneConnectionEditor was missing the Default Zone entry
c27a83c
- bash-completion: getting zones/services/icmps is different with/without --permanent
c27a83c
- firewalld.zone(5): removed superfluous slash (RHBZ#1091575)
c27a83c
- updated translations
c27a83c
cabfc2d
* Wed Feb 05 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.9.3-1
cabfc2d
- Fixed persistent port forwarding (RHBZ#1056154)
cabfc2d
- Stop default zone rules being applied to all zones (RHBZ#1057875)
cabfc2d
- Enforce trust, block and drop zones in the filter table only (RHBZ#1055190)
cabfc2d
- Allow RAs prior to applying IPv6_rpfilter (RHBZ#1058505)
cabfc2d
- Fix writing of rule.audit in zone_writer()
cabfc2d
660f9ab
* Fri Jan 17 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.9.2-1
660f9ab
- fix regression introduced in 0.3.9 (RHBZ#1053932)
660f9ab
3c3e49e
* Thu Jan 16 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.9.1-1
3c3e49e
- fix regressions introduced in 0.3.9 (RHBZ#1054068, RHBZ#1054120)
3c3e49e
ad89fb7
* Mon Jan 13 2014 Jiri Popelka <jpopelka@redhat.com> - 0.3.9-1
ad89fb7
- translation updates
ad89fb7
- New IPv6_rpfilter setting to enable source address validation (RHBZ#847707)
ad89fb7
- Do not mix original and customized zones in case of target changes,
ad89fb7
  apply only used zones
ad89fb7
- firewall-cmd: fix --*_lockdown_whitelist_uid to work with uid 0
ad89fb7
- Don't show main window maximized. (RHBZ#1046811)
ad89fb7
- Use rmmod instead of 'modprobe -r' (RHBZ#1031102)
ad89fb7
- Deprecate 'enabled' attribute of 'masquerade' element
ad89fb7
- firewall-config: new zone was added twice to the list
ad89fb7
- firewalld.dbus(5)
ad89fb7
- Enable python shebang fix again
ad89fb7
- firewall/client: handle_exceptions: Use loop in decorator
ad89fb7
- firewall-offline-cmd: Do not mask firewalld service with disabled option
ad89fb7
- firewall-config: richRuleDialogActionRejectType Entry -> ComboBox
ad89fb7
- Rich_Rule: fix parsing of reject element (RHBZ#1027373)
ad89fb7
- Show combined zones in permanent configuration (RHBZ#1002016)
ad89fb7
- firewall-cmd(1): document exit code 2 and colored output (RHBZ#1028507)
ad89fb7
- firewall-config: fix RHBZ#1028853
ad89fb7
15e74e1
* Tue Nov 05 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.8-1
15e74e1
- fix memory leaks
15e74e1
- New option --debug-gc
15e74e1
- Python3 compatibility
15e74e1
- Better non-ascii support
15e74e1
- several firewall-config & firewall-applet fixes
15e74e1
- New --remove-rules commands for firewall-cmd and removeRules methods for D-Bus
15e74e1
- Fixed FirewallDirect.get_rules to return proper list
15e74e1
- Fixed LastUpdatedOrderedDict.keys()
15e74e1
- Enable rich rule usage in trusted zone (RHBZ#994144)
15e74e1
- New error codes: INVALID_CONTEXT, INVALID_COMMAND, INVALID_USER and INVALID_UID
15e74e1
71ed813
* Thu Oct 17 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.7-1
71ed813
- Don't fail on missing ip[6]tables/ebtables table. (RHBZ#967376)
71ed813
- bash-completion: --permanent --direct options
71ed813
- firewall/core/fw.py: fix checking for iptables & ip6tables (RHBZ#1017087)
71ed813
- firewall-cmd: use client's exception_handler instead of catching exceptions ourselves
71ed813
- FirewallClientZoneSettings: fix {add|remove|query}RichRule()
71ed813
- Extend amanda-client service with 10080/tcp (RHBZ#1016867)
71ed813
- Simplify Rich_Rule()_lexer() by using functions.splitArgs()
71ed813
- Fix encoding problems in exception handling (RHBZ#1015941)
71ed813
f9bb7ae
* Fri Oct 04 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.6.2-1
f9bb7ae
- firewall-offline-cmd: --forward-port 'toaddr' is optional (RHBZ#1014958)
f9bb7ae
- firewall-cmd: fix variable name (RHBZ#1015011)
f9bb7ae
8606b62
* Thu Oct 03 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.6.1-1
8606b62
- remove superfluous po files from archive
8606b62
87ffdf6
* Wed Oct 02 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.6-1
87ffdf6
- firewalld.richlanguage.xml: correct log levels (RHBZ#993740)
87ffdf6
- firewall-config: Make sure that all zone settings are updated properly on firewalld restart
87ffdf6
- Rich_Limit: Allow long representation for duration (RHBZ#994103
87ffdf6
- firewall-config: Show "Changes applied." after changes (RHBZ#993643)
87ffdf6
- Use own connection dialog to change zones for NM connections
87ffdf6
- Rename service cluster-suite to high-availability (RHBZ#885257)
87ffdf6
- Permanent direct support for firewall-config and firewall-cmd
87ffdf6
- Try to avoid file descriptor leaking (RHBZ#951900)
87ffdf6
- New functions to split and join args properly (honoring quotes)
87ffdf6
- firewall-cmd(1): 2 simple examples
87ffdf6
- Better IPv6 NAT checking.
87ffdf6
- Ship firewalld.direct(5).
87ffdf6
606593b
* Mon Sep 30 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.5-1
606593b
- Only use one PK action for configuration (RHBZ#994729)
606593b
- firewall-cmd: indicate non-zero exit code with red color
606593b
- rich-rule: enable to have log without prefix & log_level & limit
606593b
- log-level warn/err -> warning/error (RHBZ#1009436)
606593b
- Use policy DROP while reloading, do not reset policy in restart twice
606593b
- Add _direct chains to all table and chain combinations
606593b
- documentation improvements
606593b
- New firewalld.direct(5) man page docbook source
606593b
- tests/firewall-cmd_test.sh: make rich language tests work
606593b
- Rich_Rule._import_from_string(): improve error messages (RHBZ#994150)
606593b
- direct.passthrough wasn't always matching out_signature (RHBZ#967800)
606593b
- firewall-config: twist ICMP Type IP address family logic.
606593b
- firewall-config: port-forwarding/masquerading dialog (RHBZ#993658)
606593b
- firewall-offline-cmd: New --remove-service=<service> option (BZ#969106)
606593b
- firewall-config: Options->Lockdown was not changing permanent.
606593b
- firewall-config: edit line on doubleclick (RHBZ#993572)
606593b
- firewall-config: System Default Zone -> Default Zone (RHBZ#993811)
606593b
- New direct D-Bus interface, persistent direct rule handling, enabled passthough
606593b
- src/firewall-cmd: Fixed help output to use more visual parameters
606593b
- src/firewall-cmd: New usage output, no redirection to man page anymore
606593b
- src/firewall/core/rich.py: Fixed forwad port destinations
606593b
- src/firewall-offline-cmd: Early enable/disable handling now with mask/unmask
606593b
- doc/xml/firewalld.zone.xml: Added more information about masquerade use
606593b
- Prefix to log message is optional (RHBZ#998079)
606593b
- firewall-cmd: fix --permanent --change-interface (RHBZ#997974)
606593b
- Sort zones/interfaces/service/icmptypes on output.
606593b
- wbem-https service (RHBZ#996668)
606593b
- applet&config: add support for KDE NetworkManager connection editor
606593b
- firewall/core/fw_config.py: New method update_lockdown_whitelist
606593b
- Added missing file watcher for lockdown whitelist in config D-Bus interface
606593b
- firewall/core/watcher: New add_watch_file for lockdown-whitelist and direct
606593b
- Make use of IPv6 NAT conditional, based on kernel number (RHBZ#967376)
606593b
e7b59ed
* Tue Jul 30 2013 Thomas Woerner <twoerner@redhat.com> 0.3.4-1
e7b59ed
- several rich rule check enhancements and fixes
e7b59ed
- firewall-cmd: direct options - check ipv4|ipv6|eb (RHBZ#970505)
e7b59ed
- firewall-cmd(1): improve description of direct options (RHBZ#970509)
e7b59ed
- several firewall-applet enhancements and fixes
e7b59ed
- New README
e7b59ed
- several doc and man page fixes
e7b59ed
- Service definitions for PCP daemons (RHBZ#972262)
e7b59ed
- bash-completion: add lockdown and rich language options
e7b59ed
- firewall-cmd: add --permanent --list-all[-zones]
e7b59ed
- firewall-cmd: new -q/--quiet option
e7b59ed
- firewall-cmd: warn when default zone not active (RHBZ#971843)
e7b59ed
- firewall-cmd: check priority in --add-rule (RHBZ#914955)
e7b59ed
- add dhcpv6 (for server) service (RHBZ#917866)
e7b59ed
- firewall-cmd: add --permanent --get-zone-of-interface/source --change-interface/source
e7b59ed
- firewall-cmd: print result (yes/no) of all --query-* commands
e7b59ed
- move permanent-getZoneOf{Interface|Source} from firewall-cmd to server
e7b59ed
- Check Interfaces/sources when updating permanent zone settings.
e7b59ed
- FirewallDConfig: getZoneOfInterface/Source can actually return more zones
e7b59ed
- Fixed toaddr check in forward port to only allow single address, no range
e7b59ed
- firewall-cmd: various output improvements
e7b59ed
- fw_zone: use check_single_address from firewall.functions
e7b59ed
- getZoneOfInterface/Source does not need to throw exception
e7b59ed
- firewall.functions: Use socket.inet_pton in checkIP, fixed checkIP*nMask
e7b59ed
- firewall.core.io.service: Properly check port/proto and destination address
e7b59ed
- Install applet desktop file into /etc/xdg/autostart
e7b59ed
- Fixed option problem with rich rule destinations (RHBZ#979804)
e7b59ed
- Better exception creation in dbus_handle_exceptions() decorator (RHBZ#979790)
e7b59ed
- Updated firewall-offline-cmd
e7b59ed
- Use priority in add, remove, query and list of direct rules (RHBZ#979509)
e7b59ed
- New documentation (man pages are created from docbook sources)
e7b59ed
- firewall/core/io/direct.py: use prirority for rule methods, new get_all_ methods
e7b59ed
- direct: pass priority also to client.py and firewall-cmd
e7b59ed
- applet: New blink and blink-count settings
e7b59ed
- firewall.functions: New function ppid_of_pid
e7b59ed
- applet: Check for gnome3 and fix it, use new settings, new size-changed cb
e7b59ed
- firewall-offline-cmd: Fix use of systemctl in chroot
e7b59ed
- firewall-config: use string.ascii_letters instead of string.letters
e7b59ed
- dbus_to_python(): handle non-ascii chars in dbus.String.
e7b59ed
- Modernize old syntax constructions.
e7b59ed
- dict.keys() in Python 3 returns a "view" instead of list
e7b59ed
- Use gettext.install() to install _() in builtins namespace.
e7b59ed
- Allow non-ascii chars in 'short' and 'description'
e7b59ed
- README: More information for "Working With The Source Repository"
e7b59ed
- Build environment fixes
e7b59ed
- firewalld.spec: Added missing checks for rhel > 6 for pygobject3-base
e7b59ed
- firewall-applet: New setting show-inactive
e7b59ed
- Don't stop on reload when lockdown already enabled (RHBZ#987403)
e7b59ed
- firewall-cmd: --lockdown-on/off did not touch firewalld.conf
e7b59ed
- FirewallApplet.gschema.xml: Dropped unused sender-info setting
e7b59ed
- doc/firewall-applet.xml: Added information about gsettings
e7b59ed
- several debug and log message fixes
e7b59ed
- Add chain for sources so they can be checked before interfaces (RHBZ#903222)
e7b59ed
- Add dhcp and proxy-dhcp services (RHBZ#986947)
e7b59ed
- io/Zone(): don't error on deprecated family attr of source elem
e7b59ed
- Limit length of zone file name (to 12 chars) due to Netfilter internals.
e7b59ed
- It was not possible to overload a zone with defined source(s).
e7b59ed
- DEFAULT_ZONE_TARGET: {chain}_ZONE_{zone} -> {chain}_{zone}
e7b59ed
- New runtime get<X>Settings for services and icmptypes, fixed policies callbacks
e7b59ed
- functions: New functions checkUser, checkUid and checkCommand
e7b59ed
- src/firewall/client: Fixed lockdown-whitelist-updated signal handling
e7b59ed
- firewall-cmd(1): move firewalld.richlanguage(5) reference in --*-rich-rule
e7b59ed
- Rich rule service: Only add modules for accept action
e7b59ed
- firewall/core/rich: Several fixes and enhanced checks
e7b59ed
- Fixed reload of direct rules
e7b59ed
- firewall/client: New functions to set and get the exception handler
e7b59ed
- firewall-config: New and enhanced UI to handle lockdown and rich rules
e7b59ed
- zone's immutable attribute is redundant
e7b59ed
- Do not allow to set settings in config for immutable zones.
e7b59ed
- Ignore deprecated 'immutable' attribute in zone files.
e7b59ed
- Eviscerate 'immutable' completely.
e7b59ed
- FirewallDirect.query_rule(): fix it
e7b59ed
- permanent direct: activate firewall.core.io.direct:Direct reader
e7b59ed
- core/io/*: simplify getting of character data
e7b59ed
- FirewallDirect.set_config(): allow reloading
e7b59ed
e7b59ed
* Thu Jun 20 2013  Jiri Popelka <jpopelka@redhat.com>
e7b59ed
- Remove migrating to a systemd unit file from a SysV initscript
e7b59ed
- Remove pointless "ExclusiveOS" tag
e7b59ed
158ba25
* Fri Jun  7 2013 Thomas Woerner <twoerner@redhat.com> 0.3.3-2
87ffdf6
- Fixed rich rule check for use in D-Bus
158ba25
09913de
* Thu Jun  6 2013 Thomas Woerner <twoerner@redhat.com> 0.3.3-1
09913de
- new service files
09913de
- relicensed logger.py under GPLv2+
09913de
- firewall-config: sometimes we don't want to use client's exception handler
09913de
- When removing Service/IcmpType remove it from zones too (RHBZ#958401)
09913de
- firewall-config: work-around masquerade_check_cb() being called more times
09913de
- Zone(IO): add interfaces/sources to D-Bus signature
09913de
- Added missing UNKNOWN_SOURCE error code
09913de
- fw_zone.check_source: Raise INVALID_FAMILY if family is invalid
09913de
- New changeZoneOfInterface method, marked changeZone as deprecated
09913de
- Fixed firewall-cmd man page entry for --panic-on
09913de
- firewall-applet: Fixed possible problems of unescaped strings used for markup
09913de
- New support to bind zones to source addresses and ranges (D-BUS, cmd, applet
09913de
- Cleanup of unused variables in FirewallD.start
09913de
- New firewall/fw_types.py with LastUpdatedOrderedDict
09913de
- direct.chains, direct.rules: Using LastUpdatedOrderedDict
09913de
- Support splitted zone files
09913de
- New reader and writer for stored direct chains and rules
09913de
- LockdownWhitelist: fix write(), add get_commands/uids/users/contexts()
09913de
- fix service_writer() and icmptype_writer() to put newline at end of file
09913de
- firewall-cmd: fix --list-sources
09913de
- No need to specify whether source address family is IPv4 or IPv6
09913de
- add getZoneOfSource() to D-Bus interface
09913de
- Add tests and bash-completion for the new "source" operations
09913de
- Convert all input args in D-Bus methods
09913de
- setDefaultZone() was calling accessCheck() *after* the action
09913de
- New uniqify() function to remove duplicates from list whilst preserving order
09913de
- Zone.combine() merge also services and ports
09913de
- config/applet: silence DBusException during start when FirewallD is not running (RHBZ#966518)
09913de
- firewall-applet: more fixes to make the address sources family agnostic
09913de
- Better defaults for lockdown white list
09913de
- Use auth_admin_keep for allow_any and allow_inactive also
09913de
- New D-Bus API for lockdown policies
09913de
- Use IPv4, IPv6 and BRIDGE for FirewallD properties
09913de
- Use rich rule action as audit type
09913de
- Prototype of string-only D-Bus interface for rich language
09913de
- Fixed wrongly merged source family check in firewall/core/io/zone.py
09913de
- handle_cmr: report errors, cleanup modules in error case only, mark handling
09913de
- Use audit type from rule action, fixed rule output
09913de
- Fixed lockdown whitelist D-Bus handling method names
09913de
- New rich rule handling in runtime D-Bus interface
09913de
- Added interface, source and rich rule handling (runtime and permanent)
09913de
- Fixed dbus_obj in FirewallClientConfigPolicies, added queryLockdown
09913de
- Write changes in setLockdownWhitelist
09913de
- Fixed typo in policies log message in method calls
09913de
- firewall-cmd: Added rich rule, lockdown and lockdown whitelist handling
09913de
- Don't check access in query/getLockdownWhitelist*()
09913de
- firewall-cmd: Also output masquerade flag in --list-all
09913de
- firewall-cmd: argparse is able to convert argument to desired type itself
09913de
- firewall-cmd_test.sh: tests for permanent interfaces/sources and lockdown whitelist
09913de
- Makefile.am: add missing files
09913de
- firewall-cmd_test.sh: tests for rich rules
09913de
- Added lockdown, source, interface and rich rule docs to firewall-cmd
09913de
- Do not masquerade lo if masquerade is enabled in the default zone (RHBZ#904098)
09913de
- Use <rule> in metavar for firewall-cmd parser
09913de
153e91a
* Fri May 10 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.2-2
153e91a
- removed unintentional en_US.po from tarball
153e91a
621401b
* Tue Apr 30 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.2-1
621401b
- Fix signal handling for SIGTERM
621401b
- Additional service files (RHBZ#914859)
621401b
- Updated po files
621401b
- s/persistent/permanent/ (Trac Ticket #7)
621401b
- Better behaviour when running without valid DISPLAY (RHBZ#955414)
621401b
- client.handle_exceptions(): do not loop forever
621401b
- Set Zone.defaults in zone_reader (RHBZ#951747)
621401b
- client: do not pass the dbus exception name to handler
621401b
- IO_Object_XMLGenerator: make it work with Python 2.7.4 (RHBZ#951741)
621401b
- firewall-cmd: do not use deprecated BaseException.message
621401b
- client.py: fix handle_exceptions() (RHBZ#951314)
621401b
- firewall-config: check zone/service/icmptype name (RHBZ#947820)
621401b
- Allow 3121/tcp (pacemaker_remote) in cluster-suite service. (RHBZ#885257)
621401b
- firewall-applet: fix default zone hangling in 'shields-up' (RHBZ#947230)
621401b
- FirewallError.get_code(): check for unknown error
621401b
266373a
* Wed Apr 17 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.1-2
266373a
- Make permanenent changes work with Python 2.7.4 (RHBZ#951741)
266373a
c802b43
* Thu Mar 28 2013 Thomas Woerner <twoerner@redhat.com> 0.3.1-1
c802b43
- Use explicit file lists for make dist
c802b43
- New rich rule validation check code
c802b43
- New global check_port and check_address functions
c802b43
- Allow source white and black listing with the rich rule
c802b43
- Fix error handling in case of unsupported family in rich rule
c802b43
- Enable ip_forwarding in masquerade and forward-port
c802b43
- New functions to read and write simple files using filename and content
c802b43
- Add --enable-sysconfig to install Fedora-specific sysconfig config file.
c802b43
- Add chains for security table (RHBZ#927015)
c802b43
- firewalld.spec: no need to specify --with-systemd-unitdir
c802b43
- firewalld.service: remove syslog.target and dbus.target
c802b43
- firewalld.service: replace hard-coded paths
c802b43
- Move bash-completion to new location.
c802b43
- Revert "Added configure for new build env"
c802b43
- Revert "Added Makefile.in files"
c802b43
- Revert "Added po/Makefile.in.in"
c802b43
- Revert "Added po/LINGUAS"
c802b43
- Revert "Added aclocal.m4"
c802b43
- Amend zone XML Schema
c802b43
7b258f3
* Wed Mar 20 2013 Thomas Woerner <twoerner@redhat.com> 0.3.0-1
7b258f3
- Added rich language support
7b258f3
- Added lockdown feature
7b258f3
- Allow to bind interfaces and sources to zones permanently
7b258f3
- Enabled IPv6 NAT support
7b258f3
  masquerading and port/packet forwarding for IPv6 only with rich language
7b258f3
- Handle polkit errors in client class and firewall-config
7b258f3
- Added priority description for --direct --add-rule in firewall-cmd man page
7b258f3
- Add XML Schemas for zones/services/icmptypes XMLs
7b258f3
- Don't keep file descriptors open when forking
7b258f3
- Introduce --nopid option for firewalld
7b258f3
- New FORWARD_IN_ZONES and FORWARD_OUT_ZONES chains (RHBZ#912782)
7b258f3
- Update cluster-suite service (RHBZ#885257)
7b258f3
- firewall-cmd: rename --enable/disable-panic to --panic-on/off (RHBZ#874912)
7b258f3
- Fix interaction problem of changed event of gtk combobox with polkit-kde
7b258f3
  by processing all remaining events (RHBZ#915892)
7b258f3
- Stop default zone rules being applied to all zones (RHBZ#912782)
7b258f3
- Firewall.start(): don't call set_default_zone()
7b258f3
- Add wiki's URL to firewalld(1) and firewall-cmd(1) man pages
7b258f3
- firewalld-cmd: make --state verbose (RHBZ#886484)
7b258f3
- improve firewalld --help (RHBZ#910492)
7b258f3
- firewall-cmd: --add/remove-* can be used multiple times (RHBZ#879834)
7b258f3
- Continue loading zone in case of wrong service/port etc. (RHBZ#909466)
7b258f3
- Check also services and icmptypes in Zone() (RHBZ#909466)
7b258f3
- Increase the maximum length of the port forwarding fields from 5 to 11 in
7b258f3
  firewall-config
7b258f3
- firewall-cmd: add usage to fail message
7b258f3
- firewall-cmd: redefine usage to point to man page
7b258f3
- firewall-cmd: fix visible problems with arg. parsing
7b258f3
- Use argparse module for parsing command line options and arguments
7b258f3
- firewall-cmd.1: better clarify where to find ACTIONs
7b258f3
- firewall-cmd Bash completion
7b258f3
- firewall-cmd.1: comment --zone=<zone> usage and move some options
0ada34b
- Use zone's target only in %%s_ZONES chains
7b258f3
- default zone in firewalld.conf was set to public with every restart (#902845)
7b258f3
- man page cleanup
7b258f3
- code cleanup
7b258f3
241828c
* Thu Mar 07 2013 Jiri Popelka <jpopelka@redhat.com> - 0.2.12-5
d79f3b3
- Another fix for RHBZ#912782
d79f3b3
1fc1c98
* Wed Feb 20 2013 Jiri Popelka <jpopelka@redhat.com> - 0.2.12-4
dd3c207
- Stop default zone rules being applied to all zones (RHBZ#912782)
dd3c207
40d875c
* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.2.12-3
40d875c
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
40d875c
045dfa5
* Tue Jan 22 2013 Jiri Popelka <jpopelka@redhat.com> - 0.2.12-2
045dfa5
- Default zone in firewalld.conf was reseted with every restart (RHBZ#902845)
045dfa5
- Add icon cache related scriptlets for firewall-config (RHBZ#902680)
045dfa5
- Fix typo in firewall-config (RHBZ#895812)
c802b43
- Fix few mistakes in firewall-cmd(1) man page
045dfa5
2c00316
* Mon Jan 14 2013 Thomas Woerner <twoerner@redhat.com> 0.2.12-1
2c00316
- firewall-cmd: use -V instead of -v for version info (RHBZ#886477)
2c00316
- firewall-cmd: don't check reload()'s return value (RHBZ#886461)
2c00316
- actually install firewalld.zones.5
2c00316
- firewall-config: treat exceptions when adding new zone/service/icmp
2c00316
  (RHBZ#886602)
2c00316
- firewalld.spec: Fixed requirements of firewall-config to use gtk2 and
2c00316
  pygobject3
2c00316
- Fail gracefully when running in non X environment.(RHBZ#886551)
2c00316
- offline-cmd: fail gracefully when no s-c-f config
2c00316
- fix duplicated iptables rules (RHBZ#886515)
2c00316
- detect errors and duplicates in config file (RHBZ#886581)
2c00316
- firewall-config: don't make 'Edit Service' and 'Edit ICMP Type' insensitive
2c00316
- firewalld.spec: fixed requirements, require pygobject3-base
2c00316
- frewall-applet: Unused code cleanup
2c00316
- firewall-applet: several usability fixes and enhancements
2c00316
  (RHBZ#886531) (RHBZ#886534)
2c00316
- firewall/server/server.py: fixed KeyboardInterrupt message (RHBZ#886558)
2c00316
- Moved fallback zone and minimal_mark to firewall.config.__init__
2c00316
- Do not raise ZONE_ALREADY_SET in change_zone if old zone is set again
2c00316
  (RHBZ#886432)
2c00316
- Make default zone default for all unset connections/interfaces
2c00316
  (RHBZ#888288) (RHBZ#882736)
2c00316
- firewall-config: Use Gtk.MessageType.WARNING for warning dialog
2c00316
- firewall-config: Handle unknown services and icmptypes in persistent mode
2c00316
- firewall-config: Do not load settings more than once
2c00316
- firewall-config: UI cleanup and fixes (RHBZ#888242)
2c00316
- firewall-cmd: created alias --change-zone for --change-interface
2c00316
- firewall-cmd man page updates (RHBZ#806511)
2c00316
- Merged branch 'build-cleanups'
2c00316
- dropped call to autogen.sh in build stage, not needed anymore due to 
2c00316
  'build-cleanups' merge
2c00316
6dde4a6
* Thu Dec 13 2012 Thomas Woerner <twoerner@redhat.com> 0.2.11-2
6dde4a6
- require pygobject3-base instead of pygobject3 (no cairo needed) (RHBZ#874378)
6dde4a6
- fixed dependencies of firewall-config to use gtk3 with pygobject3-base and 
6dde4a6
  not pygtk2
6dde4a6
144b73b
* Tue Dec 11 2012 Thomas Woerner <twoerner@redhat.com> 0.2.11-1
144b73b
- Fixed more _xmlplus (PyXML) incompatibilities to python xml
144b73b
- Several man page updates
144b73b
- Fixed error in addForwardPort, removeForwardPort and queryForwardPort
144b73b
- firewall-cmd: use already existing queryForwardPort()
144b73b
- Update firewall.cmd man page, use man page as firewall-cmd usage (rhbz#876394)
144b73b
- firewall-config: Do not force to show labels in the main toolbar
144b73b
- firewall-config: Dropped "Change default zone" from toolbar
144b73b
- firewall-config: Added menu entry to change zones of connections
144b73b
- firewall-applet: Zones can be changed now using nm-connection-editor
144b73b
  (rhbz#876661)
144b73b
- translation updates: cs, hu, ja
144b73b
802d926
* Tue Nov 20 2012 Thomas Woerner <twoerner@redhat.com> 0.2.10-1
802d926
- tests/firewalld_config.py: tests for config.service and config.icmptype
802d926
- FirewallClientConfigServiceSettings(): destinations are dict not list
802d926
- service/zone/icmptype: do not write deprecated name attribute
802d926
- New service ntp
802d926
- firewall-config: Fixed name of about dialog
802d926
- configure.in: Fixed getting of error codes
802d926
- Added coding to all pyhton files
802d926
- Fixed copyright years
802d926
- Beautified file headers
802d926
- Force use of pygobject3 in python-slip (RHBZ#874378)
802d926
- Log: firewall.server.config_icmptype, firewall.server.config_service and
802d926
  firewall.server.config_zone: Prepend full path
802d926
- Allow ":" in interface names for interface aliases
802d926
- Add name argument to Updated and Renamed signal
802d926
- Disable IPv4, IPv6 and EB tables if missing - for IPv4/IPv6 only environments
802d926
- firewall-config.glade file cleanup
802d926
- firewall-config: loadDefaults() can throw exception
802d926
- Use toolbars for Add/Edit/Remove/LoadDefaults buttons for zones, services
802d926
  and icmp types
802d926
- New vnc-server service, opens ports for displays :0 to :3 (RHBZ#877035)
802d926
- firewall-cmd: Fix typo in help output, allow default zone usage for
802d926
  permanenent options
802d926
- Translation updates: cs, fr, ja, pt_BR and zh_CN
802d926
a6b084e
* Wed Oct 17 2012 Thomas Woerner <twoerner@redhat.com> 0.2.9-1
a6b084e
- firewall-config: some UI usability changes
a6b084e
- firewall-cmd: New option --list-all-zones, output of --list-all changed,
a6b084e
  more option combination checks
a6b084e
- firewall-applet: Replaced NMClient by direct DBUS calls to fix python core
a6b084e
  dumps in case of connection activates/deactivates
a6b084e
- Use fallback 'C' locale if current locale isn't supported (RHBZ#860278)
a6b084e
- Add interfaces to zones again after reload
a6b084e
- firewall-cmd: use FirewallClient().connected value
a6b084e
- firewall-cmd: --remove-interface was not working due to a typo
a6b084e
- Do not use restorecon for new and backup files
a6b084e
- Fixed use of properties REJECT and DROP
a6b084e
- firewalld_test.py: check interfaces after reload
a6b084e
- Translation updates
a6b084e
- Renamed firewall-convert-scfw-config to firewall-offline-cmd, used by
a6b084e
  anaconda for firewall configuration (e.g. kickstart)
a6b084e
- Fix python shebang to use -Es at installation time for bin_SCRIPTS and
a6b084e
  sbin_SCRIPTS and at all times in gtk3_chooserbutton.py
a6b084e
- tests/firewalld_config.py: update test_zones() test case
a6b084e
- Config interface: improve renaming of zones/services/icmp_types
a6b084e
- Move emiting of Added signals closer to source.
a6b084e
- FirewallClient(): config:ServiceAdded signal was wrongly mapped
a6b084e
- Add argument 'name' to Removed signal
a6b084e
- firewall-config: Add callbacks for config:[service|icmp]-[added|removed]
a6b084e
- firewall-config: catch INVALID_X error when removing zone/service/icmp_type
a6b084e
- firewall-config: remove unused code
a6b084e
- Revert "Neutralize _xmlplus instead of conforming it"
a6b084e
- firewall-applet: some UI usability changes
a6b084e
- firewall-cmd: ALREADY_ENABLED, NOT_ENABLED, ZONE_ALREADY_SET are warnings
a6b084e
7fa1b0e
* Fri Sep  7 2012 Thomas Woerner <twoerner@redhat.com> 0.2.8-1
7fa1b0e
- Do not apply old settings to zones after reload
7fa1b0e
- FirewallClient: Added callback structure for firewalld signals
7fa1b0e
- New firewall-config with full zone, service and icmptype support
7fa1b0e
- Added Shields Up/Down configuration dialog to firewall-applet
7fa1b0e
- Name attribute of main tag deprecated for zones, services and icmptypes,
7fa1b0e
  will be ignored if present
7fa1b0e
- Fixed wrong references in firewalld man page
7fa1b0e
- Unregister DBus interfaces after sending out the Removed signal
7fa1b0e
- Use proper DBus signature in addIcmpType, addService and addZone
7fa1b0e
- New builtin property for config interfaces
7fa1b0e
- New test case for Config interface
7fa1b0e
- spec: use new systemd-rpm macros (rhbz#850110)
7fa1b0e
- More config file verifications
7fa1b0e
- Lots of smaller fixes and enhancements
7fa1b0e
7fa1b0e
* Tue Aug 21 2012 Jiri Popelka <jpopelka@redhat.com> 0.2.7-2
7fa1b0e
- use new systemd-rpm macros (rhbz#850110)
7fa1b0e
a7e552c
* Mon Aug 13 2012 Thomas Woerner <twoerner@redhat.com> 0.2.7-1
a7e552c
- Update of firewall-config
a7e552c
- Some bug fixes
a7e552c
ecdf399
* Tue Aug  7 2012 Thomas Woerner <twoerner@redhat.com> 0.2.6-1
ecdf399
- New D-BUS interface for persistent configuration
ecdf399
- Aded support for persistent zone configuration in firewall-cmd
ecdf399
- New Shields Up feature in firewall-applet
ecdf399
- New requirements for python-decorator and pygobject3
ecdf399
- New firewall-config sub-package
ecdf399
- New firewall-convert-scfw-config config script
ecdf399
dae3b70
* Fri Apr 20 2012 Thomas Woerner <twoerner@redhat.com> 0.2.5-1
dae3b70
- Fixed traceback in firewall-cmd for failed or canceled authorization, 
dae3b70
  return proper error codes, new error codes NOT_RUNNING and NOT_AUTHORIZED
dae3b70
- Enhanced firewalld service file (RHBZ#806868) and (RHBZ#811240)
dae3b70
- Fixed duplicates in zone after reload, enabled timed settings after reload
dae3b70
- Removed conntrack --ctstate INVALID check from default ruleset, because it
dae3b70
  results in ICMP problems (RHBZ#806017).
dae3b70
- Update interfaces in default zone after reload (rhbz#804814)
dae3b70
- New man pages for firewalld(1), firewalld.conf(5), firewalld.icmptype(5),
dae3b70
  firewalld.service(5) and firewalld.zone(5), updated firewall-cmd man page
dae3b70
  (RHBZ#811257)
dae3b70
- Fixed firewall-cmd help output
dae3b70
- Fixed missing icon for firewall-applet (RHBZ#808759)
dae3b70
- Added root user check for firewalld (RHBZ#767654)
dae3b70
- Fixed requirements of firewall-applet sub package (RHBZ#808746)
dae3b70
- Update interfaces in default zone after changing of default zone (RHBZ#804814)
dae3b70
- Start firewalld before NetworkManager (RHBZ#811240)
dae3b70
- Add Type=dbus and BusName to service file (RHBZ#811240)
dae3b70
56e955b
* Fri Mar 16 2012 Thomas Woerner <twoerner@redhat.com> 0.2.4-1
56e955b
- fixed firewalld.conf save exception if no temporary file can be written to 
56e955b
  /etc/firewalld/
56e955b
8c3ae5b
* Thu Mar 15 2012 Thomas Woerner <twoerner@redhat.com> 0.2.3-1
8c3ae5b
- firewall-cmd: several changes and fixes
8c3ae5b
- code cleanup
8c3ae5b
- fixed icmp protocol used for ipv6 (rhbz#801182)
8c3ae5b
- added and fixed some comments
8c3ae5b
- properly restore zone settings, timeout is always set, check for 0
8c3ae5b
- some FirewallError exceptions were actually not raised
8c3ae5b
- do not REJECT in each zone
8c3ae5b
- removeInterface() don't require zone
8c3ae5b
- new tests in firewall-test script
8c3ae5b
- dbus_to_python() was ignoring certain values
8c3ae5b
- added functions for the direct interface: chains, rules, passthrough
8c3ae5b
- fixed inconsistent data after reload
8c3ae5b
- some fixes for the direct interface: priority positions are bound to ipv,
8c3ae5b
  table and chain
8c3ae5b
- added support for direct interface in firewall-cmd:
8c3ae5b
- added isImmutable(zone) to zone D-Bus interface
8c3ae5b
- renamed policy file
8c3ae5b
- enhancements for error messages, enables output for direct.passthrough
8c3ae5b
- added allow_any to firewald policies, using at leas auth_admin for policies
8c3ae5b
- replaced ENABLE_FAILED, DISABLE_FAILED, ADD_FAILED and REMOVE_FAILED by
8c3ae5b
  COMMAND_FAILED, resorted error codes
8c3ae5b
- new firewalld configuration setting CleanupOnExit
8c3ae5b
- enabled polkit again, found a fix for property problem with slip.dbus.service
8c3ae5b
- added dhcpv6-client to 'public' (the default) and to 'internal' zones.
8c3ae5b
- fixed missing settings form zone config files in
8c3ae5b
  "firewall-cmd --list=all --zone=<zone>" call
8c3ae5b
- added list functions for services and icmptypes, added --list=services and
8c3ae5b
  --list=icmptypes to firewall-cmd
8c3ae5b
2b8e74f
* Tue Mar  6 2012 Thomas Woerner <twoerner@redhat.com> 0.2.2-1
2b8e74f
- enabled dhcpv6-client service for zones home and work
2b8e74f
- new dhcpv6-client service
2b8e74f
- firewall-cmd: query mode returns reversed values
2b8e74f
- new zone.changeZone(zone, interface)
2b8e74f
- moved zones, services and icmptypes to /usr/lib/firewalld, can be overloaded
2b8e74f
  by files in /etc/firewalld (no overload of immutable zones block, drop,
2b8e74f
  trusted)
2b8e74f
- reset MinimalMark in firewalld.cnf to default value
2b8e74f
- fixed service destination (addresses not used)
2b8e74f
- fix xmlplus to be compatible with the python xml sax parser and python 3
2b8e74f
  by adding __contains__ to xml.sax.xmlreader.AttributesImpl
2b8e74f
- use icon and glib related post, postun and posttrans scriptes for firewall
2b8e74f
- firewall-cmd: fix typo in state
2b8e74f
- firewall-cmd: fix usage()
2b8e74f
- firewall-cmd: fix interface action description in usage()
2b8e74f
- client.py: fix definition of queryInterface()
2b8e74f
- client.py: fix typo in getInterfaces()
2b8e74f
- firewalld.service: do not fork
2b8e74f
- firewall-cmd: fix bug in --list=port and --port action help message
2b8e74f
- firewall-cmd: fix bug in --list=service
2b8e74f
2b8e74f
* Mon Mar  5 2012 Thomas Woerner <twoerner@redhat.com>
2b8e74f
- moved zones, services and icmptypes to /usr/lib/firewalld, can be overloaded
2b8e74f
  by files in /etc/firewalld (no overload of immutable zones block, drop,
2b8e74f
  trusted)
2b8e74f
50e8c24
* Tue Feb 21 2012 Thomas Woerner <twoerner@redhat.com> 0.2.1-1
50e8c24
- added missing firewall.dbus_utils
50e8c24
1f08039
* Tue Feb  7 2012 Thomas Woerner <twoerner@redhat.com> 0.2.0-2
1f08039
- added glib2-devel to build requires, needed for gsettings.m4
1f08039
- added --with-system-unitdir arg to fix installaiton of system file
1f08039
- added glib-compile-schemas calls for postun and posttrans
1f08039
- added EXTRA_DIST file lists
1f08039
b734914
* Mon Feb  6 2012 Thomas Woerner <twoerner@redhat.com> 0.2.0-1
b734914
- version 0.2.0 with new FirewallD1 D-BUS interface
b734914
- supports zones with a default zone
b734914
- new direct interface as a replacement of the partial virt interface with 
b734914
  additional passthrough functionality
b734914
- dropped custom rules, use direct interface instead
b734914
- dropped trusted interface funcionality, use trusted zone instead
b734914
- using zone, service and icmptype configuration files
b734914
- not using any system-config-firewall parts anymore
b734914
066a5d2
* Mon Feb 14 2011 Thomas Woerner <twoerner@redhat.com> 0.1.3-1
066a5d2
- new version 0.1.3
066a5d2
- restore all firewall features for reload: panic and virt rules and chains
066a5d2
- string fixes for firewall-cmd man page (by Jiri Popelka)
066a5d2
- fixed firewall-cmd port list (by Jiri Popelka)
066a5d2
- added firewall dbus client connect check to firewall-cmd (by Jiri Popelka)
066a5d2
- translation updates: de, es, gu, it, ja, kn, ml, nl, or, pa, pl, ru, ta,
066a5d2
                       uk, zh_CN
066a5d2
73638b8
* Mon Jan  3 2011 Thomas Woerner <twoerner@redhat.com> 0.1.2-1
73638b8
- fixed package according to package review (rhbz#665395):
73638b8
  - non executable scripts: dropped shebang
73638b8
  - using newer GPL license file
73638b8
  - made /etc/dbus-1/system.d/FirewallD.conf config(noreplace)
73638b8
  - added requires(post) and (pre) for chkconfig
73638b8
73638b8
* Mon Jan  3 2011 Thomas Woerner <twoerner@redhat.com> 0.1.1-1
73638b8
- new version 0.1.1
73638b8
- fixed source path in POTFILES*
73638b8
- added missing firewall_config.py.in
73638b8
- added misssing space for spec_ver line
73638b8
- using firewall_config.VARLOGFILE
73638b8
- added date to logging output
73638b8
- also log fatal and error logs to stderr and firewall_config.VARLOGFILE
73638b8
- make log message for active_firewalld fatal
73638b8
73638b8
* Mon Dec 20 2010 Thomas Woerner <twoerner@redhat.com> 0.1-1
73638b8
- initial package (proof of concept implementation)