firewalld/firewalld.changes

1171 lines
54 KiB
Plaintext
Raw Normal View History

-------------------------------------------------------------------
Tue Aug 2 09:17:56 UTC 2022 - Marcus Meissner <meissner@suse.com>
- readd ipset buildrequires to reenable ipset support (bsc#1202043)
- readd ebtables too, as there is no builtin support.
-------------------------------------------------------------------
Mon Jul 25 13:38:56 UTC 2022 - Marcus Meissner <meissner@suse.com>
- readd iptables requires, as docker uses iptables passthrough
currently, which calls into iptables (bsc#1201836)
-------------------------------------------------------------------
Thu Jul 14 09:07:58 UTC 2022 - Thomas Renninger <trenn@suse.de>
- Also remove ipset, ebtables and iptables from the BuildRequires
list (compare with change from 2022-03-03 - Thorsten Kukuk <kukuk@suse.com>)
-------------------------------------------------------------------
Mon Jul 4 11:05:13 UTC 2022 - Callum Farmer <gmbr3@opensuse.org>
- Update to 1.2.0:
* feat(firewalld): add new --log-target parameter
* feat(service): add snmptls, snmptls-trap services
* feat(service): add IPFS service
* feat(fw): startup failsafe
* feat(service): Add kubelet-readonly
* feat(service): Add secure version of k8s controller-plane components
* feat(bash): completion of policy-related commands
* feat(service): add prometheus node-exporter
* feat(service): add Kodi JSON-RPC and EventServer services
-------------------------------------------------------------------
Wed Jun 15 09:32:57 UTC 2022 - Stefan Schubert <schubi@suse.com>
- Moved logrotate files from user specific directory /etc/logrotate.d
to vendor specific directory /usr/etc/logrotate.d.
-------------------------------------------------------------------
Wed Mar 30 17:09:49 UTC 2022 - Callum Farmer <gmbr3@opensuse.org>
- Update to 1.1.1:
* fix(build): oci: use centos:stream8 instead of ubi:8
* fix(functions): --check-config fails if direct.xml exists
* fix(build): oci: use dbus inside the container
* docs(README): add note about container host integration
* docs: typo fixes
-------------------------------------------------------------------
Fri Mar 18 12:43:17 UTC 2022 - Witek Bedyk <witold.bedyk@suse.com>
- Provide dummy firewalld-prometheus-config package (bsc#1197042)
-------------------------------------------------------------------
Mon Mar 7 16:45:58 UTC 2022 - Martin Wilck <mwilck@suse.com>
- Add code for safe modprobe.d migration
(https://en.opensuse.org/openSUSE:Packaging_UsrEtc)
-------------------------------------------------------------------
Fri Mar 4 20:30:02 UTC 2022 - Martin Wilck <mwilck@suse.com>
- Always own %_modprobedir (bsc#1196275, jsc#SLE-20639)
-------------------------------------------------------------------
Thu Mar 3 14:26:57 UTC 2022 - Thorsten Kukuk <kukuk@suse.com>
- Fix modprobe.d directory for SLE15 SP3
- Cleanup dependencies:
- ipset, ebtables and iptables are purely optional and deprecated,
so don't require them
- sysconfig is not needed at all
- Don't hard require systemd, we don't have and need that in containers
-------------------------------------------------------------------
Sat Feb 26 14:35:35 UTC 2022 - Callum Farmer <gmbr3@opensuse.org>
- Update to 1.1.0:
* feat(service): Add jellyfin service
* feat(policy): support OUTPUT forward ports
* feat: config check improvements
* feat(service): add http3
* feat(service): add service definition for WS-Discovery Client
* feat(service): add service definition for WS-Discovery
* feat(service): add service definition for AFP
* feat(rich): Support nflog target and add log attribute
errors/checks
* feat(service): add ZeroTier service
-------------------------------------------------------------------
Fri Jan 14 12:41:46 UTC 2022 - Callum Farmer <gmbr3@opensuse.org>
- Update to 1.0.3:
* fix(io): _check_config() expects a dict
* feat(build): distribute an OCI container image
* fix(ipset): reduce cost of entry overlap detection
-------------------------------------------------------------------
Thu Nov 18 10:04:38 UTC 2021 - Michał Rostecki <mrostecki@suse.com>
- Update to 1.0.2:
* fix(firewalld): check capng_apply() return code
* fix(nftables): do not log icmp block if inversion
* fix(nftables): rich: source address with netmask
* fix(fw_config): zone: on rename remove then add
* fix(io/functions): check_config against on disk conf
* fix(zone): detect same source/interface in zones
* docs(policy): fix typos
* docs(policies): fix typos
-------------------------------------------------------------------
Sat Sep 25 20:24:33 UTC 2021 - Callum Farmer <gmbr3@opensuse.org>
- Update to 1.0.1:
* keep linux capability CAP_SYS_MODULE
* UPnP Client: actually allow SSDP traffic
* Fix RPM macros to test if firewall-cmd is executable
-------------------------------------------------------------------
Sat Aug 7 14:27:01 UTC 2021 - Callum Farmer <gmbr3@opensuse.org>
- Update to 1.0.0:
* Reduced dependencies
* Intra-zone forwarding by default
* NAT rules moved to inet family (reduced rule set)
* Default target is now similar to reject
* ICMP blocks and block inversion only apply to input,
not forward
* tftp-client service has been removed
* iptables backend is deprecated
* Direct interface is deprecated
* CleanupModulesOnExit defaults to no
(kernel modules not unloaded)
- Add new firewalld-test package
- Move bash and zsh completions to more useful separate packages
- Clean spec file
- Move modprobe.d and autostart files out of /etc
-------------------------------------------------------------------
Wed Apr 7 09:24:28 UTC 2021 - Michał Rostecki <mrostecki@suse.com>
- Remove dependency on firewalld from firewall-macros (bsc#1183404)
-------------------------------------------------------------------
Tue Jan 26 16:33:10 UTC 2021 - Michał Rostecki <mrostecki@suse.com>
- Disable FlushAllOnReload option to not retain interface to zone
assignments and direct rules when using --reload option.
* 0002-Disable-FlushAllOnReload-option.patch
-------------------------------------------------------------------
Mon Jan 25 11:29:37 UTC 2021 - Michał Rostecki <mrostecki@suse.com>
- Update to 0.9.3 (jsc#SLE-17336):
* docs(dbus): fix invalid method names
* fix(forward): iptables: ipset used as zone source
* fix(rich): non-printable characters removed from rich rules
* docs(firewall-cmd): small description grammar fix
* fix(rich): limit table to strip non-printables to C0 and C1
* fix(zone): add source with mac address
-------------------------------------------------------------------
Thu Jan 14 09:52:26 UTC 2021 - Robert Frohl <rfrohl@suse.com>
- Add dependency for firewall-offline-cmd (bsc#1180883)
-------------------------------------------------------------------
Mon Nov 9 09:15:55 UTC 2020 - Michał Rostecki <mrostecki@suse.com>
- Remove the patch which enforces usage of iptables instead of
nftables (jsc#SLE-16300):
* 0001-firewall-backend-Switch-default-backend-to-iptables.patch
- Add firewalld zone for the docker0 interface. This is the
workaround for lack of nftables support in docker. Without that
additional zone, containers have no Internet connectivity.
(rhbz#1817022, jsc#SLE-16300)
- Update to 0.9.1:
* Bugfixes:
* docs(firewall-cmd): clarify lockdown whitelist command paths
* fix(dbus): getActivePolicies shouldn't return a policy if a zone is not active
* fix(policy): zone interface/source changes should affect all using zone
-------------------------------------------------------------------
Fri Sep 11 18:05:42 UTC 2020 - Franck Bui <fbui@suse.com>
- Make use of %service_del_postun_without_restart
And stop using DISABLE_RESTART_ON_UPDATE as this interface is
obsolete.
-------------------------------------------------------------------
Wed Sep 9 14:47:20 UTC 2020 - Michał Rostecki <mrostecki@suse.com>
- Add python3-nftables as a requirement.
Accepting request 827072 from home:dirkmueller:branches:security:netfilter - update to 0.8.3: * nftables: convert to libnftables JSON interface * service: new “helper” element to replace “module” More accurately represents the conntrack helper. Deprecates “module”. * allow custom helpers using standard helper modules (rhbz 1733066) * testsuite is now shipped in the dist tarball * Typo in firewall-config(1) * Fix typo in TFTP service description * doc: README: add note about language translations * fix: rich: source/dest only matching with mark action * feat: AllowZoneDrifting config option * feat: nftables: support AllowZoneDrifting=yes * feat: ipXtables: support AllowZoneDrifting=yes * fix: firewall-offline-cmd: Don’t print warning about AllowZoneDrifting * fix: add logrotate policy * doc: direct: add CAVEATS section * fix: checkIP6: strip leading/trailing square brackets * fix: nftables: remove square brackets from IPv6 addresses * fix: ipXtables: remove square brackets from IPv6 addresses * fix: nftables: ipset types using “port” * fix: nftables: zone dispatch with multidimensional ipsets * fix: ipset: destroy runtime sets on reload/stop * fix: port: support querying sub ranges * fix: source_port: support querying sub ranges * doc: specify accepted characters for object names * fix: doc: address copy/paste mistakes in short/description * fix: configure: atlocal: quote variable values * fix: nftables: allow set intervals with concatenations * doc: clarify –set-target values “default” vs “reject” * fix: update dynamic DCE RPC ports in freeipa-trust service * fix: nftables: ipset: port ranges for non-default protocols OBS-URL: https://build.opensuse.org/request/show/827072 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=103
2020-08-17 09:45:59 +02:00
-------------------------------------------------------------------
Fri Sep 4 16:10:06 UTC 2020 - Callum Farmer <callumjfarmer13@gmail.com>
- update to 0.9.0:
* New major features
* prevention of Zone Drifting
* Intra Zone Forwarding
* Policy Objects
* For a full list of changes, see
https://github.com/firewalld/firewalld/compare/v0.8.0...v0.9.0
-------------------------------------------------------------------
Accepting request 827072 from home:dirkmueller:branches:security:netfilter - update to 0.8.3: * nftables: convert to libnftables JSON interface * service: new “helper” element to replace “module” More accurately represents the conntrack helper. Deprecates “module”. * allow custom helpers using standard helper modules (rhbz 1733066) * testsuite is now shipped in the dist tarball * Typo in firewall-config(1) * Fix typo in TFTP service description * doc: README: add note about language translations * fix: rich: source/dest only matching with mark action * feat: AllowZoneDrifting config option * feat: nftables: support AllowZoneDrifting=yes * feat: ipXtables: support AllowZoneDrifting=yes * fix: firewall-offline-cmd: Don’t print warning about AllowZoneDrifting * fix: add logrotate policy * doc: direct: add CAVEATS section * fix: checkIP6: strip leading/trailing square brackets * fix: nftables: remove square brackets from IPv6 addresses * fix: ipXtables: remove square brackets from IPv6 addresses * fix: nftables: ipset types using “port” * fix: nftables: zone dispatch with multidimensional ipsets * fix: ipset: destroy runtime sets on reload/stop * fix: port: support querying sub ranges * fix: source_port: support querying sub ranges * doc: specify accepted characters for object names * fix: doc: address copy/paste mistakes in short/description * fix: configure: atlocal: quote variable values * fix: nftables: allow set intervals with concatenations * doc: clarify –set-target values “default” vs “reject” * fix: update dynamic DCE RPC ports in freeipa-trust service * fix: nftables: ipset: port ranges for non-default protocols OBS-URL: https://build.opensuse.org/request/show/827072 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=103
2020-08-17 09:45:59 +02:00
Sun Aug 16 17:09:43 UTC 2020 - Dirk Mueller <dmueller@suse.com>
- update to 0.8.3:
* nftables: convert to libnftables JSON interface
* service: new “helper” element to replace “module” More accurately represents the conntrack helper. Deprecates “module”.
* allow custom helpers using standard helper modules (rhbz 1733066)
* testsuite is now shipped in the dist tarball
* Typo in firewall-config(1)
* Fix typo in TFTP service description
* doc: README: add note about language translations
* fix: rich: source/dest only matching with mark action
* feat: AllowZoneDrifting config option
* feat: nftables: support AllowZoneDrifting=yes
* feat: ipXtables: support AllowZoneDrifting=yes
* fix: firewall-offline-cmd: Dont print warning about AllowZoneDrifting
* fix: add logrotate policy
* doc: direct: add CAVEATS section
* fix: checkIP6: strip leading/trailing square brackets
* fix: nftables: remove square brackets from IPv6 addresses
* fix: ipXtables: remove square brackets from IPv6 addresses
* fix: nftables: ipset types using “port”
* fix: nftables: zone dispatch with multidimensional ipsets
* fix: ipset: destroy runtime sets on reload/stop
* fix: port: support querying sub ranges
* fix: source_port: support querying sub ranges
* doc: specify accepted characters for object names
* fix: doc: address copy/paste mistakes in short/description
* fix: configure: atlocal: quote variable values
* fix: nftables: allow set intervals with concatenations
* doc: clarify set-target values “default” vs “reject”
* fix: update dynamic DCE RPC ports in freeipa-trust service
* fix: nftables: ipset: port ranges for non-default protocols
* fix(systemd): Conflict with nftables.service
* fix(direct): rule in a zone chain
* fix(client): addService needs to reduce tuple size
* fix(doc): dbus: signatures for zone tuple based APIs
* fix(config): bool values in dict based import/export
* fix(dbus): service: dont cleanup config for old set APIs
* fix(ipset): flush the set if IndividiualCalls=yes
* fix(firewall-offline-cmd): remove instances of “[P]” in help text
* fix(rich): source mac with nftables backend
* docs: replace occurrences of the term blacklist with denylist
* fix: core: rich: Catch ValueError on non-numeric priority values
* docs(README): add libxslt for doc generation
* fix(cli): add zone is an invalid option with direct
* fix(cli): add ipset type hash:mac is incompatible with the family parameter
Accepting request 826046 from home:mrostecki:branches:security:netfilter - Update to version 0.7.5: * release: v0.7.5 * chore(translation): merge from master * fix(cli): add ipset type hash:mac is incompatible with the family parameter Fixes: rhbz1541077 * test(rhbz1483921): better test name * fix(cli): add --zone is an invalid option with --direct * fix: core: rich: Catch ValueError on non-numeric priority values * fix: update dynamic DCE RPC ports in freeipa-trust service * docs: replace occurrences of the term blacklist with denylist * docs(README): add libxslt for doc generation * test(rich): source mac with nftables backend * fix(firewall-offline-cmd): remove instances of "[P]" in help text * test(check-container): add support for centos8 stream * test(functions): use IndividualCalls if host doesn't support nft rule index * test(functions): add macro IF_HOST_SUPPORTS_NFT_RULE_INDEX * test(dbus): better way to check IPv6_rpfilter expected value * fix(ipset): flush the set if IndividiualCalls=yes * test(ipv6): skip square bracket address tests if ipv6 not available * test(gh509): only run test for nftables backend * fix(dbus): service: don't cleanup config for old set APIs * fix(config): bool values in dict based import/export * fix(doc): dbus: signatures for zone tuple based APIs * test(dbus): zone: fix zone runtime functional test title * test(dbus): zone: fix false failure due to list order * fix(client): addService needs to reduce tuple size * test(direct): rule in a zone chain * fix(direct): rule in a zone chain * test(dbus): zone: verify runtime config APIs * test(dbus): zone: verify permanent config APIs * fix(systemd): Conflict with nftables.service OBS-URL: https://build.opensuse.org/request/show/826046 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=102
2020-08-12 16:05:48 +02:00
-------------------------------------------------------------------
Wed Aug 12 13:48:37 UTC 2020 - mrostecki@suse.com
- Update to version 0.7.5 (jsc#SLE-12281):
Accepting request 826046 from home:mrostecki:branches:security:netfilter - Update to version 0.7.5: * release: v0.7.5 * chore(translation): merge from master * fix(cli): add ipset type hash:mac is incompatible with the family parameter Fixes: rhbz1541077 * test(rhbz1483921): better test name * fix(cli): add --zone is an invalid option with --direct * fix: core: rich: Catch ValueError on non-numeric priority values * fix: update dynamic DCE RPC ports in freeipa-trust service * docs: replace occurrences of the term blacklist with denylist * docs(README): add libxslt for doc generation * test(rich): source mac with nftables backend * fix(firewall-offline-cmd): remove instances of "[P]" in help text * test(check-container): add support for centos8 stream * test(functions): use IndividualCalls if host doesn't support nft rule index * test(functions): add macro IF_HOST_SUPPORTS_NFT_RULE_INDEX * test(dbus): better way to check IPv6_rpfilter expected value * fix(ipset): flush the set if IndividiualCalls=yes * test(ipv6): skip square bracket address tests if ipv6 not available * test(gh509): only run test for nftables backend * fix(dbus): service: don't cleanup config for old set APIs * fix(config): bool values in dict based import/export * fix(doc): dbus: signatures for zone tuple based APIs * test(dbus): zone: fix zone runtime functional test title * test(dbus): zone: fix false failure due to list order * fix(client): addService needs to reduce tuple size * test(direct): rule in a zone chain * fix(direct): rule in a zone chain * test(dbus): zone: verify runtime config APIs * test(dbus): zone: verify permanent config APIs * fix(systemd): Conflict with nftables.service OBS-URL: https://build.opensuse.org/request/show/826046 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=102
2020-08-12 16:05:48 +02:00
* release: v0.7.5
* chore(translation): merge from master
* fix(cli): add ipset type hash:mac is incompatible with the family parameter Fixes: rhbz1541077
* test(rhbz1483921): better test name
* fix(cli): add --zone is an invalid option with --direct
* fix: core: rich: Catch ValueError on non-numeric priority values
* fix: update dynamic DCE RPC ports in freeipa-trust service
* docs: replace occurrences of the term blacklist with denylist
* docs(README): add libxslt for doc generation
* test(rich): source mac with nftables backend
* fix(firewall-offline-cmd): remove instances of "[P]" in help text
* test(check-container): add support for centos8 stream
* test(functions): use IndividualCalls if host doesn't support nft rule index
* test(functions): add macro IF_HOST_SUPPORTS_NFT_RULE_INDEX
* test(dbus): better way to check IPv6_rpfilter expected value
* fix(ipset): flush the set if IndividiualCalls=yes
* test(ipv6): skip square bracket address tests if ipv6 not available
* test(gh509): only run test for nftables backend
* fix(dbus): service: don't cleanup config for old set APIs
* fix(config): bool values in dict based import/export
* fix(doc): dbus: signatures for zone tuple based APIs
* test(dbus): zone: fix zone runtime functional test title
* test(dbus): zone: fix false failure due to list order
* fix(client): addService needs to reduce tuple size
* test(direct): rule in a zone chain
* fix(direct): rule in a zone chain
* test(dbus): zone: verify runtime config APIs
* test(dbus): zone: verify permanent config APIs
* fix(systemd): Conflict with nftables.service
* fix: test/regression/gh599: use expr to be more portable
* test: dbus: zone: verify runtime config API signatures
* test: dbus: zone: verify permanent config API signatures
* fix: test/regression/gh599: fix if not using debug output
* test: log: verify logging still works after truncate
* test: ipset: verify port ranges for non-default protocol
Accepting request 791189 from home:lemmy04:branches:security:netfilter - Update to 0.7.4 This is a bug fix only release. However, it does reintroduce the zone drifting bug as a feature. See #258 and #441. This behavior is disabled by default. * improvement: build: add an option to disable building documentation * Typo in firewall-config(1) * Fix typo in TFTP service description * doc: README: add note about language translations * fix: rich: source/dest only matching with mark action * feat: AllowZoneDrifting config option * feat: nftables: support AllowZoneDrifting=yes * feat: ipXtables: support AllowZoneDrifting=yes * fix: firewall-offline-cmd: Don't print warning about AllowZoneDrifting * fix: add logrotate policy * fix: tests: regenerate testsuite if .../{cli,python}/*.at changes * doc: direct: add CAVEATS section * fix: checkIP6: strip leading/trailing square brackets * fix: nftables: remove square brackets from IPv6 addresses * fix: ipXtables: remove square brackets from IPv6 addresses * fix: nftables: zone dispatch with multidimensional ipsets * fix: ipset: destroy runtime sets on reload/stop * fix: port: support querying sub ranges * fix: source_port: support querying sub ranges * doc: specify accepted characters for object names * fix: doc: address copy/paste mistakes in short/description * fix: configure: atlocal: quote variable values * fix: nftables: allow set intervals with concatenations * doc: clarify --set-target values "default" vs "reject" OBS-URL: https://build.opensuse.org/request/show/791189 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=101
2020-04-03 14:30:54 +02:00
-------------------------------------------------------------------
Fri Apr 3 07:39:02 UTC 2020 - Mathias Homann <Mathias.Homann@opensuse.org>
- Update to 0.7.4
This is a bug fix only release.
However, it does reintroduce the zone drifting bug as a feature. See #258 and #441. This behavior is disabled by default.
* improvement: build: add an option to disable building documentation
* Typo in firewall-config(1)
* Fix typo in TFTP service description
* doc: README: add note about language translations
* fix: rich: source/dest only matching with mark action
* feat: AllowZoneDrifting config option
* feat: nftables: support AllowZoneDrifting=yes
* feat: ipXtables: support AllowZoneDrifting=yes
* fix: firewall-offline-cmd: Don't print warning about AllowZoneDrifting
* fix: add logrotate policy
* fix: tests: regenerate testsuite if .../{cli,python}/*.at changes
* doc: direct: add CAVEATS section
* fix: checkIP6: strip leading/trailing square brackets
* fix: nftables: remove square brackets from IPv6 addresses
* fix: ipXtables: remove square brackets from IPv6 addresses
* fix: nftables: zone dispatch with multidimensional ipsets
* fix: ipset: destroy runtime sets on reload/stop
* fix: port: support querying sub ranges
* fix: source_port: support querying sub ranges
* doc: specify accepted characters for object names
* fix: doc: address copy/paste mistakes in short/description
* fix: configure: atlocal: quote variable values
* fix: nftables: allow set intervals with concatenations
* doc: clarify --set-target values "default" vs "reject"
Accepting request 783084 from home:frispete:Tumbleweed - Update to version 0.7.3: * release: v0.7.3 * chore: update translations * doc: README: add note about integration tests * test: check-container: also run check-integration * test: integration: NM zone overrides interface on reload * test: build: support integration tests * test: functions: add macro NMCLI_CHECK * test: functions: new macros for starting/stopping NetworkManager * fix: test: leave "cleanup" for tests cases * test: check-container: add support for fedora rawhide * test: check-container: add support for debian sid * test: build: add support for running in containers * fix: test/functions: FWD_END_TEST: improve grep for errors/warnings * fix: test: direct passthrough: no need to check for dummy module * fix: test: CHECK_NAT_COEXISTENCE: only check for kernel version * fix: reload: let NM interface assignments override permanent config * chore: tests: rename IF_IPV6_SUPPORTED to IF_HOST_SUPPORTS_IPV6_RULES * fix: tests: convert host ipv6 checks to runtime * fix: tests: convert ip6tables checks to runtime * fix: tests: convert probe of nft numeric args to runtime * fix: tests: convert nftables fib checks to runtime * fix: build: distribute testsuite * fix: don't probe for available kernel modules * fix: failure to load modules no longer fatal * fix: tests/functions: canonicalize XML output * chore: doc: update authors * fix: test: use debug output based on autotest variable * fix: src/tests/Makefile: distclean should clean atconfig OBS-URL: https://build.opensuse.org/request/show/783084 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=100
2020-03-09 21:49:58 +01:00
-------------------------------------------------------------------
Sun Mar 08 17:20:42 UTC 2020 - hpj@urpla.net
- Update to version 0.7.3:
* release: v0.7.3
* chore: update translations
* doc: README: add note about integration tests
* test: check-container: also run check-integration
* test: integration: NM zone overrides interface on reload
* test: build: support integration tests
* test: functions: add macro NMCLI_CHECK
* test: functions: new macros for starting/stopping NetworkManager
* fix: test: leave "cleanup" for tests cases
* test: check-container: add support for fedora rawhide
* test: check-container: add support for debian sid
* test: build: add support for running in containers
* fix: test/functions: FWD_END_TEST: improve grep for errors/warnings
* fix: test: direct passthrough: no need to check for dummy module
* fix: test: CHECK_NAT_COEXISTENCE: only check for kernel version
* fix: reload: let NM interface assignments override permanent config
* chore: tests: rename IF_IPV6_SUPPORTED to IF_HOST_SUPPORTS_IPV6_RULES
* fix: tests: convert host ipv6 checks to runtime
* fix: tests: convert ip6tables checks to runtime
* fix: tests: convert probe of nft numeric args to runtime
* fix: tests: convert nftables fib checks to runtime
* fix: build: distribute testsuite
* fix: don't probe for available kernel modules
* fix: failure to load modules no longer fatal
* fix: tests/functions: canonicalize XML output
* chore: doc: update authors
* fix: test: use debug output based on autotest variable
* fix: src/tests/Makefile: distclean should clean atconfig
-------------------------------------------------------------------
Tue Feb 4 20:49:00 UTC 2020 - Bjørn Lie <bjorn.lie@gmail.com>
- No longer recommend -lang: supplements are in use.
-------------------------------------------------------------------
Sun Nov 24 17:36:31 UTC 2019 - Neal Gompa <ngompa13@gmail.com>
- Replace incorrect usage of %_libexecdir with %_prefix/lib
-------------------------------------------------------------------
Thu Oct 10 12:40:49 UTC 2019 - Mathias Homann <Mathias.Homann@opensuse.org>
- rebased the original patch from revision 19
-------------------------------------------------------------------
Fri Oct 4 09:44:37 UTC 2019 - Mathias Homann <Mathias.Homann@opensuse.org>
- Added a patch to make iptables the default again on openSUSE
-------------------------------------------------------------------
Fri Oct 4 09:10:54 UTC 2019 - Mathias Homann <Mathias.Homann@opensuse.org>
- Update to version 0.7.2:
This is a bug fix only release.
* fix: direct: removeRules() was mistakenly removing all rules
* fix: guarantee zone source dispatch is sorted by zone name
* fix: nftables: fix zone dispatch using ipset sources in nat chains
* doc: add --default-config and --system-config
* fix: --add-masquerade should only affect ipv4
* fix: nftables: --forward-ports should only affect IPv4
* fix: direct: removeRules() not removing all rules in chain
* dbus: service: fix service includes individual APIs
* fix: allow custom helpers using standard helper modules
* fix: service: usage of helpers with '-' in name
* fix: Revert "ebtables: drop support for broute table"
* fix: ebtables: don't use tables that aren't available
* fix: fw: initialize _rfc3964_ipv4
Accepting request 729405 from home:mrostecki:branches:security:netfilter - Update to version 0.7.1: * Rich Rule Priorities * Service Definition Includes - Service definitions can now include lines like: <include service="https"/> which will include all the ports, etc from the https service. * RFC3964 IPv4 filtering - A new option RFC3964_IPv4 in firewalld.conf is available. It does filtering based on RFC3964 in regards to IPv4 addresses. This functionality was traditionally in network-scripts. * FlushAllOnReload - A new option FlushAllOnReload in firewalld.conf is available. Older release retained some settings (direct rules, interface to zone assignments) during a --reload. With the introduction of this configuration option that is no longer the case. Old behavior can be restored by setting FlushAllOnReload=no. * 15 new service definitions * fix: firewall-offline-cmd: service: use dict based APIs * fix: client: service: use dict based dbus APIs * test: dbus: coverage for new service APIs * fix: dbus: new dict based APIs for services * test: dbus: service API coverage * test: functions: add macro DBUS_INTROSPECT * test: functions: add CHOMP macro for shell output * fix: tests/functions: use gdbus instead of dbus-send * fix: dbus: add missing APIs for service includes - Remove patch for using iptables instead of nftables - we should finally switch to nftables and fix its issues properly if they occur again: * 0001-firewall-backend-Switch-default-backend-to-iptables.patch - Remove patch which was released upstream: * 0002-Add-FlushAllOnReload-config-option.patch OBS-URL: https://build.opensuse.org/request/show/729405 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=95
2019-09-09 12:44:18 +02:00
-------------------------------------------------------------------
Mon Sep 09 09:59:00 UTC 2019 - mrostecki@opensuse.org
- Update to version 0.7.1:
* Rich Rule Priorities
* Service Definition Includes - Service definitions can now
include lines like: <include service="https"/> which will
include all the ports, etc from the https service.
* RFC3964 IPv4 filtering - A new option RFC3964_IPv4 in
firewalld.conf is available. It does filtering based on RFC3964
in regards to IPv4 addresses. This functionality was
traditionally in network-scripts.
* FlushAllOnReload - A new option FlushAllOnReload in
firewalld.conf is available. Older release retained some
settings (direct rules, interface to zone assignments) during a
--reload. With the introduction of this configuration option
that is no longer the case. Old behavior can be restored by
setting FlushAllOnReload=no.
* 15 new service definitions
* fix: firewall-offline-cmd: service: use dict based APIs
* fix: client: service: use dict based dbus APIs
* test: dbus: coverage for new service APIs
* fix: dbus: new dict based APIs for services
* test: dbus: service API coverage
* test: functions: add macro DBUS_INTROSPECT
* test: functions: add CHOMP macro for shell output
* fix: tests/functions: use gdbus instead of dbus-send
* fix: dbus: add missing APIs for service includes
- Remove patch for using iptables instead of nftables - we should
finally switch to nftables and fix its issues properly if they
occur again:
* 0001-firewall-backend-Switch-default-backend-to-iptables.patch
- Remove patch which was released upstream:
* 0002-Add-FlushAllOnReload-config-option.patch
-------------------------------------------------------------------
Tue Jun 11 16:27:57 UTC 2019 - mrostecki@opensuse.org
- Update to version 0.6.4:
* chore: update translations
* treewide: fix over indentation (flake8 E117)
* test: travis: add another test matrix for omitting ip6tables
* chore: travis: split test matrix by keywords
* chore: tests: add AT_KEYWORDS for firewall-offline-cmd
* improvement: tests: Use AT_KEYWORDS for backends
* fix: tests: guard occurrences of IPv6
* fix: tests/functions: ignore warnings about missing ip6tables
* test: add macro IF_IPV6_SUPPORTED
-------------------------------------------------------------------
Wed May 8 09:39:08 UTC 2019 - Dominique Leuenberger <dimstar@opensuse.org>
- Move RPM macros to %_rpmmacrodir.
-------------------------------------------------------------------
Thu Mar 28 14:29:54 UTC 2019 - Dominique Leuenberger <dimstar@opensuse.org>
- Revert last change: the macros DO reference firewall-cmd, but as
they are expanded during build time of the package, not at
runtime, the point in time is wrong to require firewalld. The
consumer of the macro is responsible to ask for the right
commands to be present at runtime of the scripts
(boo#1125775#c9).
-------------------------------------------------------------------
Mon Feb 25 14:27:19 UTC 2019 - Michał Rostecki <mrostecki@opensuse.org>
- Add dependency between firewall-macros and firewalld.
(boo#1125775)
-------------------------------------------------------------------
Wed Feb 6 16:01:03 UTC 2019 - Michał Rostecki <mrostecki@opensuse.org>
- Fix --with-ifcfgdir configure parameter. (boo#1124212)
-------------------------------------------------------------------
Thu Jan 10 10:23:32 UTC 2019 - Michał Rostecki <mrostecki@suse.de>
- Add upstream patch to make --reload/--complete-reload forget the
runtime configuration and always load the permanent one
(bsc#1121277)
* 0002-Add-FlushAllOnReload-config-option.patch
-------------------------------------------------------------------
Mon Oct 15 11:04:05 UTC 2018 - Markos Chandras <mchandras@suse.de>
- Update to 0.6.3. Some of the changes are:
* update translations
* nftables: fix reject statement in "block" zone
* shell-completion: bash: don't check firewalld state
* firewalld: fix --runtime-to-permanent if NM not in use.
* firewall-cmd: sort --list-protocols output
* firewall-cmd: sort --list-services output
* command: sort services/protocols in --list-all output
* services: add audit
* nftables: fix rich rule log/audit being added to wrong chain
* nftables: fix destination checks not allowing masks
* firewall/core/io/*.py: Let SAX handle the encoding of XML files (gh#firewalld/firewalld#395)(bsc#1083361)
* fw_zone: expose _ipset_match_flags()
* tests/firewall-cmd: exercise multiple interfaces and zones
* fw_transaction: On clear zone transaction, must clear fw and other zones
* Fix translating labels (gh#firewalld/firewalld#392)
- Remove patches which have made it upstream:
* 0001-Fix-translating-labels-392.patch
* 0002-firewalld-0.6.x-rich-rule-with-ipset-regression.patch
-------------------------------------------------------------------
Mon Sep 24 09:05:52 UTC 2018 - Markos Chandras <mchandras@suse.de>
- Add upstream patch to mark more strings as translatable which is
required by firewall UI when creating rich rules (bsc#1096542)
* 0001-Fix-translating-labels-392.patch
-------------------------------------------------------------------
Fri Sep 21 17:13:32 UTC 2018 - Luiz Angelo Daros de Luca <luizluca@gmail.com>
- Add upstream patch to fix rich rules that uses ipset (bsc#1104990)
* 00002-firewalld-0.6.x-rich-rule-with-ipset-regression.patch
Accepting request 636832 from home:markoschandras:network - Update to 0.6.2. Some of the changes are: * update translations * nftables: fix log-denied with values other than "all" or "off" * fw_ipset: raise FirewallError if backend command fails * ipset: only use "-exist" on restore * fw_ipset: fix duplicate add of ipset entries * *tables: For opened ports/protocols/etc match ct state new,untracked (bsc#1105821) * ipXtables: increase wait lock to 10s * nftables: fix rich rules ports/protocols/source ports not considering ct state * ports: allow querying a single added by range * fw_zone: do not change rich rule errors into warnings * fw_zone: fix services with multiple destination IP versions (bsc#1105899) * fw_zone: consider destination for protocols * firewall/core/fw_nm: nm_get_zone_of_connection should return None or empty string instead of False (boo#1106319) * fw: If direct rules fail to apply add a "Direct" label to error msg * fw: if startup fails on reload, reapply non-perm config that survives reload * nftables: fix rich rule audit log * ebtables: replace RETURN policy with explicit RETURN at end of chain * direct backends: allow build_chain() to build multiple rules * fw: if failure occurs during startup set state to FAILED * fw: on restart set policy from same function * ebtables: drop support for broute table - Remove upstream patches * 0001-nftables-fix-rich-rules-ports-protocols-source-ports.patch * 0001-fw_zone-consider-destination-for-protocols.patch * 0002-fw_zone-fix-services-with-multiple-destination-IP-ve.patch * firewalld-fix-firewalld-config-crash.patch OBS-URL: https://build.opensuse.org/request/show/636832 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=85
2018-09-20 11:09:53 +02:00
-------------------------------------------------------------------
Thu Sep 20 07:27:33 UTC 2018 - Markos Chandras <mchandras@suse.de>
- Update to 0.6.2. Some of the changes are:
* update translations
* nftables: fix log-denied with values other than "all" or "off"
* fw_ipset: raise FirewallError if backend command fails
* ipset: only use "-exist" on restore
* fw_ipset: fix duplicate add of ipset entries
* *tables: For opened ports/protocols/etc match ct state new,untracked (bsc#1105821)
* ipXtables: increase wait lock to 10s
* nftables: fix rich rules ports/protocols/source ports not considering ct state
* ports: allow querying a single added by range
* fw_zone: do not change rich rule errors into warnings
* fw_zone: fix services with multiple destination IP versions (bsc#1105899)
* fw_zone: consider destination for protocols
* firewall/core/fw_nm: nm_get_zone_of_connection should return None or empty string instead of False (boo#1106319)
* fw: If direct rules fail to apply add a "Direct" label to error msg
* fw: if startup fails on reload, reapply non-perm config that survives reload
* nftables: fix rich rule audit log
* ebtables: replace RETURN policy with explicit RETURN at end of chain
* direct backends: allow build_chain() to build multiple rules
* fw: if failure occurs during startup set state to FAILED
* fw: on restart set policy from same function
* ebtables: drop support for broute table
- Remove upstream patches
* 0001-nftables-fix-rich-rules-ports-protocols-source-ports.patch
* 0001-fw_zone-consider-destination-for-protocols.patch
* 0002-fw_zone-fix-services-with-multiple-destination-IP-ve.patch
* firewalld-fix-firewalld-config-crash.patch
-------------------------------------------------------------------
Mon Sep 17 14:28:19 UTC 2018 - Markos Chandras <mchandras@suse.de>
- Add upstream patch to fix Neighbor Discovery filtering for IPv6 (bsc#1105821)
* 0001-nftables-fix-rich-rules-ports-protocols-source-ports.patch
- Add upstream patch to fix building rules for multiple IP families (bsc#1105899)
* 0001-fw_zone-consider-destination-for-protocols.patch
* 0002-fw_zone-fix-services-with-multiple-destination-IP-ve.patch
-------------------------------------------------------------------
Sun Sep 2 03:50:37 UTC 2018 - luc14n0@linuxmail.org
- Add firewalld-fix-firewalld-config-crash.patch: set
nm_get_zone_of_connection to return 'None' instead of 'False' for
automatically generated connections to avoid firewall-config
crashes. Patch provided by upstream (boo#1106319,
gh#firewalld/firewalld#370).
-------------------------------------------------------------------
Mon Aug 13 19:08:39 UTC 2018 - mchandras@suse.de
- Also switch firewall backend fallback to 'iptables' (bsc#1102761)
This ensures that existing configuration files will keep working
even if FirewallBackend option is missing.
* 0001-firewall-backend-Switch-default-backend-to-iptables.patch
-------------------------------------------------------------------
Fri Aug 10 06:23:35 UTC 2018 - mchandras@suse.de
- Update to 0.6.1. Some of the changes are:
* Correct source/destination in rich rule masquerade
* Only modify ifcfg files for permanent configuration changes
* Fix a backtrace when calling common_reverse_rule()
* man firewalld.conf: Show nftables is the default FirewallBackend
* firewall-config: fix some untranslated strings that caused a UI
bug causing rich rules to not be modify-able (bsc#1096542)
* fw_direct: avoid log for untracked passthrough queries
* fixed many issues if iptables is actually iptables-nft
* Use preferred location for AppData files
* ipXtables: fix ICMP block inversion with set-log-denied
* fixes ICMP block inversion with set-log-denied with
IndividualCalls=yes
* nftables: fix set-log-denied if target is not ACCEPT
* fw_direct: strip _direct chain suffix if using nftables
* NetworkManager integration bugfixes.
-------------------------------------------------------------------
Mon Aug 6 06:14:07 UTC 2018 - mchandras@suse.de
- Switch back to 'iptables' backend as default (bsc#1102761)
-------------------------------------------------------------------
Fri Jul 6 15:07:31 UTC 2018 - mchandras@suse.de
- Update to 0.6.0. Some of the changes are:
* update translations
* firewall-config: Add ipv6-icmp to the protocol dropdown box (#348, bsc#1099698)
* core: logger: Remove world-readable bit from logfile (#349, bsc#1098986)
* IPv6 rpfilter: explicitly allow neighbor solicitation
* nftables backend (default)
* Added loads of new services
* firewall-cmd: add --check-config option
* firewall-offline-cmd: add --check-config option
* firewallctl: completely remove all code and references
* dbus: expose FirewallBackend
* dbus: fix erroneous fallback for AutomaticHelpers
- Remove patches which have made it upstream
* firewalld-add-additional-services.patch
- spec-cleaner fixes
-------------------------------------------------------------------
Mon May 14 08:41:27 UTC 2018 - mchandras@suse.de
- Update to 0.5.3 (bsc#1093120)
* tests/regression: add test for ipset with timeout
* ipset: allow adding entries to ipsets with timeout
* translations: update
* helpers: load helper module explicitly if no port given
* helpers: nf_conntrack_proto-* helpers needs name cropped
* config/Makefile: correct name of proto-gre helper
* tests/regression: test helper nf_conntrack_proto_gre (#263)
* functions: get_nf_nat_helpers() should look in other directories too
* functions: Allow nf_conntrack_proto_* helpers
* services: Add GRE
* helpers: Add proto-gre
* tests/regression: add test to verify ICMP block in forward chain
* ipXtables: fix ICMP block not being present in FORWARD chain
-------------------------------------------------------------------
Wed Apr 18 18:10:19 CEST 2018 - sbrabec@suse.com
- Translations update (bsc#1081623).
-------------------------------------------------------------------
Fri Mar 16 07:58:50 UTC 2018 - mchandras@suse.de
- Backport upstream patches to add additional services (bsc#1082033)
* firewalld-add-additional-services.patch
-------------------------------------------------------------------
Tue Mar 13 18:44:11 UTC 2018 - mchandras@suse.de
- Update to 0.5.2
* fix rule deduplication causing accidental removal of rules
* log failure to parse direct rules xml as an error
* firewall-config: Break infinite loop when firewalld is not running
* fix set-log-denied not taking effect
* po: update translations
-------------------------------------------------------------------
Thu Feb 1 14:32:27 UTC 2018 - mchandras@suse.de
- Remove high-availability service. SUSE HA uses the cluster service
provided by the yast2-cluster package (bsc#1078223)
-------------------------------------------------------------------
Tue Jan 30 21:27:16 UTC 2018 - mchandras@suse.de
- Update to 0.5.1
* ipXtables: fix iptables-restore wait option detection
* python3: use "foo in dict" not dict.has_key(foo)
* Fix potential python3 keys() incompatibility in watcher
* Fixed python3 compatibility
* ebtables: fix missing default value to set_rule()
* fw_zone: fix invalid reference to __icmp_block_inversion
* zones: Correct and defer check_name for combined zones
-------------------------------------------------------------------
Fri Jan 26 12:36:57 UTC 2018 - mchandras@suse.de
- Update to 0.5.0
* firewallctl: mark deprecated (gh#firewalld/firewalld##261)
* Add nmea-0183 service
* Add sycthing-gui service
* Add syncthing service
* Adding FirewallD jenkins service (gh#firewalld/firewalld#256)
* services/high-availability: Add port 9929
* Fix and improve firewalld-sysctls.conf
* firewalld: also reload dbus config interface for global options
* Add MongoDB service definition
* src: firewall: Add support for SUSE ifcfg scripts
* Add UPnP client service
* firewalld: Allow specifying log file location
* firewalld/firewall-offline-cmd: Allow setting system config directories
- Drop obsolete patch
* 0001-suse-ifcfg-files.patch
- Drop tests installation
-------------------------------------------------------------------
Thu Dec 21 13:03:11 UTC 2017 - mchandras@suse.de
- Introduce new python3-firewall and firewall-macros subpackages.
The first one contains the firewalld python3 bindings and the second
one contains the RPM macros for firewalld.
-------------------------------------------------------------------
Wed Nov 29 10:59:45 UTC 2017 - dimstar@opensuse.org
- Replace dbus-1-python requires with dbus-1-python3: since
firewalld was migrated to python3, we also have to require the
python3 dependencies (boo#1070310).
-------------------------------------------------------------------
Tue Nov 28 12:30:59 UTC 2017 - mchandras@suse.de
- Add missing python3-gobject-Gdk dependency (boo#1069952)
-------------------------------------------------------------------
Thu Nov 23 13:37:50 UTC 2017 - rbrown@suse.com
- Replace references to /var/adm/fillup-templates with new
%_fillupdir macro (boo#1069468)
-------------------------------------------------------------------
Sun Nov 19 18:37:31 UTC 2017 - mpluskal@suse.com
- Make sure to use python3 everywhere (boo#1068778)
-------------------------------------------------------------------
Thu Nov 16 08:41:27 UTC 2017 - mchandras@suse.de
- Add combined upstream patch to support SUSE ifcfg network files.
* 0001-suse-ifcfg-files.patch (gh#firewalld/firewalld#262, fate#323460)
Accepting request 542023 from home:markoschandras:network - Update to version 0.4.4.6 * firewall.core.fw_config: Fix check for icmp builtin name * config.services: docker-swarm: fix incorrect attribute * xmlschema/service.xsd: Fix protocol looking for name instead of value * Add docker swarm service (gh#firewalld/firewalld#230) * Adding FirewallD redis service (gh#firewalld/firewalld#248) * Adding firewalld zabbix server and agent services (gh#firewalld/firewalld#221) * firewall-offline-cmd: Don't require root for help output * doc: firewall-cmd: Document --query-* options return codes * firewall-cmd: Use colors only if output is a TTY * core: Log unsupported ICMP types as informational only * add bgp service to predefined services edit to config/Makefile.am * Add git service * Add kprop service * minidlna definitions (gh#firewalld/firewalld#236) * SpiderOak ONE listens on port 21327 and 21328 * autogen.sh: Allow skipping configure via NOCONFIGURE env var * Add missing ports to RH-Satellite-6 service * Reload nf_conntrack sysctls after the module is loaded * Add NFSv3 service. * config/Makefile.am: Add murmur service (a95eed1) * add new service IRC * firewall.core.prog: Simplify runProg output: Combine stderr and stdout * firewall.core.fw: Fix possible dict size change in for loop * firewall.core.fw: Use new firewalld git repo in firewalld organization * config/firewall-config.appdata.xml.in: Use new firewalld git repo in firewalld organization * firewall.core.fw_zone: Rich-rule ICMP type: Error only for conflicting family * firewall.core.rich: Add checks for Rich_Source validation * Handle also IPv6 with the zone masquerade flag * Add IPv6 support for forward-ports in zones OBS-URL: https://build.opensuse.org/request/show/542023 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=47
2017-11-16 09:13:55 +01:00
-------------------------------------------------------------------
Wed Nov 15 12:36:09 UTC 2017 - mchandras@suse.de
- Update to version 0.4.4.6
* firewall.core.fw_config: Fix check for icmp builtin name
* config.services: docker-swarm: fix incorrect attribute
* xmlschema/service.xsd: Fix protocol looking for name instead of value
* Add docker swarm service (gh#firewalld/firewalld#230)
* Adding FirewallD redis service (gh#firewalld/firewalld#248)
* Adding firewalld zabbix server and agent services (gh#firewalld/firewalld#221)
* firewall-offline-cmd: Don't require root for help output
* doc: firewall-cmd: Document --query-* options return codes
* firewall-cmd: Use colors only if output is a TTY
* core: Log unsupported ICMP types as informational only
* add bgp service to predefined services edit to config/Makefile.am
* Add git service
* Add kprop service
* minidlna definitions (gh#firewalld/firewalld#236)
* SpiderOak ONE listens on port 21327 and 21328
* autogen.sh: Allow skipping configure via NOCONFIGURE env var
* Add missing ports to RH-Satellite-6 service
* Reload nf_conntrack sysctls after the module is loaded
* Add NFSv3 service.
* config/Makefile.am: Add murmur service (a95eed1)
* add new service IRC
* firewall.core.prog: Simplify runProg output: Combine stderr and stdout
* firewall.core.fw: Fix possible dict size change in for loop
* firewall.core.fw: Use new firewalld git repo in firewalld organization
* config/firewall-config.appdata.xml.in: Use new firewalld git repo in firewalld organization
* firewall.core.fw_zone: Rich-rule ICMP type: Error only for conflicting family
* firewall.core.rich: Add checks for Rich_Source validation
* Handle also IPv6 with the zone masquerade flag
* Add IPv6 support for forward-ports in zones
* firewall.command: Enable parse_forward_port to work with IPv6 adresses
* firewall.core.fw_zone: Fix IPv6 address in rich rule forward ports
* add Murmur (Mumble server) service
- spec file fixes to avoid rpmlint warnings about duplicate files.
-------------------------------------------------------------------
Wed Nov 8 17:25:40 UTC 2017 - mpluskal@suse.com
- Switch to python3
- Run spec cleaner
- Move autogen to build section
- Add systemd requirements
-------------------------------------------------------------------
Tue Jun 6 15:12:27 UTC 2017 - mchandras@suse.de
- Update to version 0.4.4.5
* firewall-offline-cmd: Fix --remove-service-from-zone option (rh#1438127)
* Support sctp and dccp in ports, source-ports, forward-ports, helpers and rich rules
* firewall-cmd: Fix --{set,get}-{short,description} for zone
* firewall.core.ipXtables: Use new wait option for restore commands if available
* Adding ovirt-vmconsole service file
* Adding oVirt storage-console service.
* Adding ctdb service file.
* Adding service file for nrpe.
* Rename extension for policy choices (server and desktop) to .policy.choice (rh#1449754)
* D-Bus interfaces: Fix GetAll for interfaces without properties (rh#1452017)
* firewall.core.fw_config: Fix wrong variable use in repr output
* firewall.core.fw_icmptype: Add missing import for copy
* firewall.core.fw_test: Fix wrong format string in repr
* firewall.core.io.zone: Fix getattr use on super(Zone)
* firewall.functions: New function get_nf_nat_helpers
* firewall.core.fw: Get NAT helpers and store them internally.
* firewall.core.fw_zone: Load NAT helpers with conntrack helpers
* firewalld.dbus: Add missing properties nf_conntrach_helper_setting and nf_conntrack_helpers
* firewall.server.firewalld: New property for NAT helpers supported by the kernel
-------------------------------------------------------------------
Mon Mar 27 22:27:20 UTC 2017 - mchandras@suse.de
- Update to version 0.4.4.4
* Drop references to fedorahosted.org from spec file and Makefile.am
* firewall-config: Show invalid ipset type in the ipset dialog in the bad label
* firewall.core.fw: Show icmptypes and ipsets with type errors in permanent env
* firewall.server.firewalld: Provide information about the supported icmp types
* firewall.core.fw_icmptype: Add ICMP type only if the type is supported
* firewall.core.fw: New attributes ip{4,6}tables_supported_icmp_types
* firewall.core.ipXtables: New method supported_icmp_types
* firewall-config: Deactivate edit buttons if there are no items
* firewall.core.io.zone: Fix permanent rich rules using icmp-type (rh#1434594)
* firewall.core.fw_ipset: get_ipset may not ckeck if set is applied by default
* firewall.core.fw_transaction: Use LastUpdatedOrderedDict for zone transactions
- Remove upstream patch:
* 0001-firewall.core.fw_ipset-get_ipset-may-not-ckeck-if-se.patch
Accepting request 458640 from home:markoschandras:network - Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal OBS-URL: https://build.opensuse.org/request/show/458640 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=38
2017-02-17 10:46:55 +01:00
-------------------------------------------------------------------
Mon Feb 13 16:20:27 UTC 2017 - mchandras@suse.de
- Update to version 0.4.4.3
* New service freeipa-trust (rh#1411650)
* Complete icmp types for IPv4 and IPv6
* New h323 helper container
* Support helper container: h323
* firewall.server.decorators: ALREADY_ errors should be logged as warnings
* firewall.command: ALREADY_SET should also result in zero exit code
* tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd
* Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface
* New checks for ipset entry validation
* Use ipset dimension for match
* firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list
* New firewall.core.icmp providing names and types for icmp and icmpv6 values
* firewall.core.fw_ipset: New methods to get ipset dimension and applied state
* firewall.errors: New error NOT_APPLIED
* firewall-cmd man page: Add missing --get-ipset-types
* firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345)
* firewall.core.prog: Fix addition of the error output in runProg
* Speed up ipset handling, (re)loading and import from file
* Support --family option for --new-ipset
* Handle FirewallError for query sequences in command line tools
* Fail to alter entries of ipsets with timeout
* Extended tests for ipset options
* Return empty list for ipsets using timeouts
* firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186)
* firewalld.conf man page: New section about AutomaticHelpers
* firewall-offline-cmd man page: Added -v and -q options, fixed section ids
* firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface
* firewall.core.fw_zone: Limit masquerading forward rule to new connections
* firewall-config: Update active zones on reloaded signal
* firewall-applet: Update active zones and tooltip on reloaded signal
* firewall.core.fw_zone: Fix missing chain for helper in rich rules using service (rh#1416578)
* Support icmp-type usage in rich rules (rh#1409544)
* firewall[-offline]-cmd: Fix --{set,get}-{short,description} for ipset and helper (rh#1416325)
* firewall.core.ipset: Solve ipset creation issues with -exist and more flag tests
* Speed up start and restart for ipsets with lots of entries (rh#1416817)
* Speed up of ipset alteration by adding and removing entries using a file (rh#1416817)
* Code cleanup and minor bug fixes
* firewall.core.prog: Fix addition of the error output in runProg
* New services mssql, kibana, elasticsearch, quassel, bitcoin-rpc, bitcoin-testnet-rpc, bitcoin-testnet, bitcoin and spideroak-lansync
* Translation updates
- Add upstream patch to fix ipset overloading from /etc/firewalld/ipsets (gh#t-woerner/firewalld#206)
* 0001-firewall.core.fw_ipset-get_ipset-may-not-ckeck-if-se.patch
Accepting request 458640 from home:markoschandras:network - Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal OBS-URL: https://build.opensuse.org/request/show/458640 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=38
2017-02-17 10:46:55 +01:00
-------------------------------------------------------------------
Mon Dec 5 09:41:03 UTC 2016 - mchandras@suse.de
- Update to version 0.4.4.2
* firewalld.spec: Added helpers and ipsets paths to firewalld-filesystem
* firewall.core.fw_nm: create NMClient lazily
* Do not use hard-coded path for modinfo, use autofoo to detect it
* firewall.core.io.ifcfg: Dropped invalid option warning with bad format string
* firewall.core.io.ifcfg: Properly handle quoted ifcfg values
* firewall.core.fw_zone: Do not reset ZONE with ifdown
* Updated translations from zanata
* firewall-config: Extra grid at bottom to visualize firewalld settings
-------------------------------------------------------------------
Mon Nov 14 16:08:01 UTC 2016 - mchandras@suse.de
- Update to version 0.4.4.1
* Translation updates form zanata
* firewallctl: New support for helpers
* firewallctl: Use sys.excepthook to force exception_handler usage always
* firewall-config: Use proper source check in sourceDialog
-------------------------------------------------------------------
Mon Oct 31 12:07:49 UTC 2016 - mchandras@suse.de
- Update to version 0.4.4
* firewall-applet: Use PyQt5
* firewall-config: New nf_conntrack_select dialog, use nf_conntrack_helpers
D-Bus property
* New helpers Q.931 and RAS from nf_conntrack_h323
* firewall.core.fw_zone: Add zone bingings for PREROUTING in the raw table
* firewall.core.ipXtables: Add PREROUTING default rules for zones in raw
table
* New helper configuration files for amanda, ftp, irc, netbios-ns, pptp,
sane, sip, snmp and tftp
* firewall-cmd: Fixed --{get,set}-{description,short} for permanent zones
* firewall.command: Do not use error code 254 for {ALREADY,NOT}_ENABLED
sequences
* Misc bug fixes.
* For the complete list of changes please see:
https://github.com/t-woerner/firewalld/releases/tag/v0.4.4
-------------------------------------------------------------------
Fri Sep 2 23:21:51 UTC 2016 - mchandras@suse.de
- Relax permissions for default installation files. The files in
/usr/lib/firewalld are the default ones as shipped by the package and
there is nothing secret in them.
-------------------------------------------------------------------
Tue Aug 16 17:51:30 UTC 2016 - mchandras@suse.de
- Update to version 0.4.3.3
* Fixes CVE-2016-5410 (bsc#992772)
* Standard error is now used for errors and warnings
* Several fixes for use in change roots
* Systemd service file changes
* Fixed translations in firewall-config
* Command line clients
* Fixes infinite event handling loop in firewall-{config,applet} (bsc#992082)
-------------------------------------------------------------------
Tue Jul 5 14:02:18 UTC 2016 - mchandras@suse.de
- Update to version 0.4.3.2
* Fix regression with unavailable optional commands
* All missing backend messages should be warnings
* Individual calls for missing restore commands
* Only one authenticate call for add and remove options and also
sequences
* New service RH-Satellite-6
-------------------------------------------------------------------
Tue Jun 28 14:59:35 UTC 2016 - mchandras@suse.de
- Update to version 0.4.3.1
* firewall.command: Fix python3 DBusException message not interable error
* src/Makefile.am: Fix path in firewall-[offline-]cmd_test.sh while installing
* firewallctl: Do not trace back on list command without further arguments
* firewallctl (man1): Added remaining sections zone, service, ..
* firewallctl: Added runtime-to-permanent, interface and source parser, IndividualCalls setting
* firewall.server.config: Allow to set IndividualCalls property in config interface
* Fix missing icmp rules for some zones
* runProg: Fix issue with running programs
* firewall-offline-cmd: Fix issues with missing system-config-firewall
* firewall.core.ipXtables: Split up source and dest addresses for transaction
* firewall.server.config: Log error in case of loading malformed files in watcher
* Install and package the firewallctl man page
* Translation updates
Accepting request 404198 from home:markoschandras:network - Update to version 0.4.3 * New firewallctl utility (RHBZ#1147959) * doc.xml.seealso: Show firewalld.dbus in See Also sections * firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (RHBZ#1339251) * {zone,service,ipset,icmptype}_writer: Do not fail on failed backup * firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd * firewall-cmd: Dropped duplicate setType call in --new-ipset * radius service: Support also tcp ports (RBZ#1219717) * xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources * config.xmlschema.service.xsd: Fix service destination conflicts (RHBZ#1296573) * firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg * firewall.command: Only print summary and description in print_X_info with verbose * firewall.command: print_msg should be able to print empty lines * firewall-config: No processing of runtime passthroughs signals in permanent * Landspace.io fixes and pylint calm downs * firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes * firewall-config: Fixed titles of command and context dialogs, also entry lenths * firewall-config: pylint calm downs * firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit * firewall-config: Use self.active_zoens in conf_zone_added_cb * firewall.command: New parse_port, extended parse methods with more checks * firewall.command: Fixed parse_port to use the separator in the split call * firewall.command: New [de]activate_exception_handler, raise error in parse_X * services ha: Allow corosync-qnetd port * firewall-applet: Support for kde5-nm-connection-editor * tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications * firewall-offline-cmd: Use FirewallCommand for simplification and sequence options * tests/firewall-cmd_test.sh: New tests for service and icmptype modifications * firewall-cmd: Fixed set, remove and query destination options for services * firewall.core.io.service: Source ports have not been checked in _check_config OBS-URL: https://build.opensuse.org/request/show/404198 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=21
2016-06-24 16:39:08 +02:00
-------------------------------------------------------------------
Wed Jun 22 14:15:29 UTC 2016 - mchandras@suse.de
- Update to version 0.4.3
Accepting request 458640 from home:markoschandras:network - Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal OBS-URL: https://build.opensuse.org/request/show/458640 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=38
2017-02-17 10:46:55 +01:00
* New firewallctl utility (rh#1147959)
Accepting request 404198 from home:markoschandras:network - Update to version 0.4.3 * New firewallctl utility (RHBZ#1147959) * doc.xml.seealso: Show firewalld.dbus in See Also sections * firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (RHBZ#1339251) * {zone,service,ipset,icmptype}_writer: Do not fail on failed backup * firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd * firewall-cmd: Dropped duplicate setType call in --new-ipset * radius service: Support also tcp ports (RBZ#1219717) * xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources * config.xmlschema.service.xsd: Fix service destination conflicts (RHBZ#1296573) * firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg * firewall.command: Only print summary and description in print_X_info with verbose * firewall.command: print_msg should be able to print empty lines * firewall-config: No processing of runtime passthroughs signals in permanent * Landspace.io fixes and pylint calm downs * firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes * firewall-config: Fixed titles of command and context dialogs, also entry lenths * firewall-config: pylint calm downs * firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit * firewall-config: Use self.active_zoens in conf_zone_added_cb * firewall.command: New parse_port, extended parse methods with more checks * firewall.command: Fixed parse_port to use the separator in the split call * firewall.command: New [de]activate_exception_handler, raise error in parse_X * services ha: Allow corosync-qnetd port * firewall-applet: Support for kde5-nm-connection-editor * tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications * firewall-offline-cmd: Use FirewallCommand for simplification and sequence options * tests/firewall-cmd_test.sh: New tests for service and icmptype modifications * firewall-cmd: Fixed set, remove and query destination options for services * firewall.core.io.service: Source ports have not been checked in _check_config OBS-URL: https://build.opensuse.org/request/show/404198 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=21
2016-06-24 16:39:08 +02:00
* doc.xml.seealso: Show firewalld.dbus in See Also sections
Accepting request 458640 from home:markoschandras:network - Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal OBS-URL: https://build.opensuse.org/request/show/458640 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=38
2017-02-17 10:46:55 +01:00
* firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (rh#1339251)
Accepting request 404198 from home:markoschandras:network - Update to version 0.4.3 * New firewallctl utility (RHBZ#1147959) * doc.xml.seealso: Show firewalld.dbus in See Also sections * firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (RHBZ#1339251) * {zone,service,ipset,icmptype}_writer: Do not fail on failed backup * firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd * firewall-cmd: Dropped duplicate setType call in --new-ipset * radius service: Support also tcp ports (RBZ#1219717) * xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources * config.xmlschema.service.xsd: Fix service destination conflicts (RHBZ#1296573) * firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg * firewall.command: Only print summary and description in print_X_info with verbose * firewall.command: print_msg should be able to print empty lines * firewall-config: No processing of runtime passthroughs signals in permanent * Landspace.io fixes and pylint calm downs * firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes * firewall-config: Fixed titles of command and context dialogs, also entry lenths * firewall-config: pylint calm downs * firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit * firewall-config: Use self.active_zoens in conf_zone_added_cb * firewall.command: New parse_port, extended parse methods with more checks * firewall.command: Fixed parse_port to use the separator in the split call * firewall.command: New [de]activate_exception_handler, raise error in parse_X * services ha: Allow corosync-qnetd port * firewall-applet: Support for kde5-nm-connection-editor * tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications * firewall-offline-cmd: Use FirewallCommand for simplification and sequence options * tests/firewall-cmd_test.sh: New tests for service and icmptype modifications * firewall-cmd: Fixed set, remove and query destination options for services * firewall.core.io.service: Source ports have not been checked in _check_config OBS-URL: https://build.opensuse.org/request/show/404198 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=21
2016-06-24 16:39:08 +02:00
* {zone,service,ipset,icmptype}_writer: Do not fail on failed backup
* firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd
* firewall-cmd: Dropped duplicate setType call in --new-ipset
* radius service: Support also tcp ports (RBZ#1219717)
* xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources
Accepting request 458640 from home:markoschandras:network - Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal OBS-URL: https://build.opensuse.org/request/show/458640 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=38
2017-02-17 10:46:55 +01:00
* config.xmlschema.service.xsd: Fix service destination conflicts (rh#1296573)
Accepting request 404198 from home:markoschandras:network - Update to version 0.4.3 * New firewallctl utility (RHBZ#1147959) * doc.xml.seealso: Show firewalld.dbus in See Also sections * firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (RHBZ#1339251) * {zone,service,ipset,icmptype}_writer: Do not fail on failed backup * firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd * firewall-cmd: Dropped duplicate setType call in --new-ipset * radius service: Support also tcp ports (RBZ#1219717) * xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources * config.xmlschema.service.xsd: Fix service destination conflicts (RHBZ#1296573) * firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg * firewall.command: Only print summary and description in print_X_info with verbose * firewall.command: print_msg should be able to print empty lines * firewall-config: No processing of runtime passthroughs signals in permanent * Landspace.io fixes and pylint calm downs * firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes * firewall-config: Fixed titles of command and context dialogs, also entry lenths * firewall-config: pylint calm downs * firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit * firewall-config: Use self.active_zoens in conf_zone_added_cb * firewall.command: New parse_port, extended parse methods with more checks * firewall.command: Fixed parse_port to use the separator in the split call * firewall.command: New [de]activate_exception_handler, raise error in parse_X * services ha: Allow corosync-qnetd port * firewall-applet: Support for kde5-nm-connection-editor * tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications * firewall-offline-cmd: Use FirewallCommand for simplification and sequence options * tests/firewall-cmd_test.sh: New tests for service and icmptype modifications * firewall-cmd: Fixed set, remove and query destination options for services * firewall.core.io.service: Source ports have not been checked in _check_config OBS-URL: https://build.opensuse.org/request/show/404198 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=21
2016-06-24 16:39:08 +02:00
* firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg
* firewall.command: Only print summary and description in print_X_info with verbose
* firewall.command: print_msg should be able to print empty lines
* firewall-config: No processing of runtime passthroughs signals in permanent
* Landspace.io fixes and pylint calm downs
* firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes
* firewall-config: Fixed titles of command and context dialogs, also entry lenths
* firewall-config: pylint calm downs
* firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit
* firewall-config: Use self.active_zoens in conf_zone_added_cb
* firewall.command: New parse_port, extended parse methods with more checks
* firewall.command: Fixed parse_port to use the separator in the split call
* firewall.command: New [de]activate_exception_handler, raise error in parse_X
* services ha: Allow corosync-qnetd port
* firewall-applet: Support for kde5-nm-connection-editor
* tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications
* firewall-offline-cmd: Use FirewallCommand for simplification and sequence options
* tests/firewall-cmd_test.sh: New tests for service and icmptype modifications
* firewall-cmd: Fixed set, remove and query destination options for services
* firewall.core.io.service: Source ports have not been checked in _check_config
* firewall.core.fw_zone: Method check_source_port is not used, removed
* firewall.core.base: Added default to ZONE_TARGETS
* firewall.client: Allow to remove ipv:address pair for service destinations
* tests/firewall-offline-cmd_test.sh: There is no timeout option in permanent
* firewall-cmd: Landscape.io fixes, pylint calm downs
* firewall-cmd: Use FirewallCommand for simplification and sequence options
* firewall.command: New FirewallCommand for command line client simplification
* New services: kshell, rsh, ganglia-master, ganglia-client
* firewalld: Cleanup of unused imports, do not translate some deamon messages
* firewalld: With fd close interation in runProg, it is not needed here anymore
* firewall.core.prog: Add fd close iteration to runProg
* firewall.core.fw_nm: Hide NM typelib import, new nm_get_dbus_interface function
* firewalld.spec: Require NetworkManager-libnm instead of NetworkManager-glib
* firewall-config: New add/remove ipset entries from file, remove all entries
* firewall-applet: Fix tooltip after applet start with connection to firewalld
* firewall-config: Select new zone, service or icmptype if the view was empty
* firewalld.spec: Added build requires for iptables, ebtables and ipset
* Adding nf_conntrack_sip module to the service SIP
* firewall: core: fw_ifcfg: Quickly return if ifcfg directory does not exist
* Drop unneeded python shebangs
* Translation updates
- Remove obsolete patches:
* 0001-src-firewall-core-Drop-unneeded-python-shebangs.patch
* 0002-firewall-core-fw_ifcfg-Quickly-return-if-ifcfg-direc.patch
* 0003-firewall.core.fw_nm-Hide-NM-typelib-import-new-nm_ge.patch
Accepting request 404198 from home:markoschandras:network - Update to version 0.4.3 * New firewallctl utility (RHBZ#1147959) * doc.xml.seealso: Show firewalld.dbus in See Also sections * firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (RHBZ#1339251) * {zone,service,ipset,icmptype}_writer: Do not fail on failed backup * firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd * firewall-cmd: Dropped duplicate setType call in --new-ipset * radius service: Support also tcp ports (RBZ#1219717) * xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources * config.xmlschema.service.xsd: Fix service destination conflicts (RHBZ#1296573) * firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg * firewall.command: Only print summary and description in print_X_info with verbose * firewall.command: print_msg should be able to print empty lines * firewall-config: No processing of runtime passthroughs signals in permanent * Landspace.io fixes and pylint calm downs * firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes * firewall-config: Fixed titles of command and context dialogs, also entry lenths * firewall-config: pylint calm downs * firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit * firewall-config: Use self.active_zoens in conf_zone_added_cb * firewall.command: New parse_port, extended parse methods with more checks * firewall.command: Fixed parse_port to use the separator in the split call * firewall.command: New [de]activate_exception_handler, raise error in parse_X * services ha: Allow corosync-qnetd port * firewall-applet: Support for kde5-nm-connection-editor * tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications * firewall-offline-cmd: Use FirewallCommand for simplification and sequence options * tests/firewall-cmd_test.sh: New tests for service and icmptype modifications * firewall-cmd: Fixed set, remove and query destination options for services * firewall.core.io.service: Source ports have not been checked in _check_config OBS-URL: https://build.opensuse.org/request/show/404198 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=21
2016-06-24 16:39:08 +02:00
- Add missing %{?_smp_mflags} during install. This will speed up
the installation phase as well as expose build system's problems
due to higher level of parallelism.
- Run make during %build to ensure missing documentation is generated.
- spec file cleanups.
-------------------------------------------------------------------
Wed Jun 8 08:10:11 UTC 2016 - mchandras@suse.de
- Add upstream patch to prevent unconditional dependencies to the
NetworkManager typelib (gh#t-woerner/firewalld#119)
* 0003-firewall.core.fw_nm-Hide-NM-typelib-import-new-nm_ge.patch
Accepting request 399135 from home:markoschandras:network - Update to version 0.4.2 * New module to search for and change ifcfg files for interfaces not under control of NM * firewall_config: Enhanced messages in status bar * firewall-config: New message window as overlay if not connected * firewall-config: Fix sentivity of option, view menus and main paned if not connected * firewall-applet: Quit on SIGINT (Ctrl-C), reduced D-Bus calls, some cleanup * firewall-[offline]cmd: Show target in zone information * D-Bus: Completed masquerade methods in FirewallClientZoneSettings * Fixed log-denied rules for icmp-blocks * Keep sorting of interfaces, services, icmp-blocks and other settings in zones * Fixed runtime-to-permanent not to save interfaces under control of NM * New icmp-block-inversion flag in the zones * ICMP type filtering in the zones * New services: sip, sips, managesieve * rich rules: Allow destination action (RHBZ#1163428) * firewall-offline-cmd: New option -q/--quiet * firewall-[offline-]cmd: New --add-[zone,service,ipset,icmptype]-from-file * firewall-[offline-]cmd: Fix option for setting the destination address * firewall-config: Fixed resizing behaviour * New transaction model for speed ups in start, restart, stop and other actions * firewall-cmd: New options --load{zone,service,ipset,icmptype}-defaults * Fixed memory leak in dbus_introspection_add_properties * Landscape.io fixes, pylint calm downs OBS-URL: https://build.opensuse.org/request/show/399135 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=17
2016-06-01 12:15:39 +02:00
-------------------------------------------------------------------
Tue May 31 08:30:44 UTC 2016 - mchandras@suse.de
- Update to version 0.4.2
* New module to search for and change ifcfg files for interfaces
not under control of NM
* firewall_config: Enhanced messages in status bar
* firewall-config: New message window as overlay if not connected
* firewall-config: Fix sentivity of option, view menus and main
paned if not connected
* firewall-applet: Quit on SIGINT (Ctrl-C), reduced D-Bus calls,
some cleanup
* firewall-[offline]cmd: Show target in zone information
* D-Bus: Completed masquerade methods in FirewallClientZoneSettings
* Fixed log-denied rules for icmp-blocks
* Keep sorting of interfaces, services, icmp-blocks and other
settings in zones
* Fixed runtime-to-permanent not to save interfaces under control
of NM
* New icmp-block-inversion flag in the zones
* ICMP type filtering in the zones
* New services: sip, sips, managesieve
Accepting request 458640 from home:markoschandras:network - Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal OBS-URL: https://build.opensuse.org/request/show/458640 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=38
2017-02-17 10:46:55 +01:00
* rich rules: Allow destination action (rh#1163428)
Accepting request 399135 from home:markoschandras:network - Update to version 0.4.2 * New module to search for and change ifcfg files for interfaces not under control of NM * firewall_config: Enhanced messages in status bar * firewall-config: New message window as overlay if not connected * firewall-config: Fix sentivity of option, view menus and main paned if not connected * firewall-applet: Quit on SIGINT (Ctrl-C), reduced D-Bus calls, some cleanup * firewall-[offline]cmd: Show target in zone information * D-Bus: Completed masquerade methods in FirewallClientZoneSettings * Fixed log-denied rules for icmp-blocks * Keep sorting of interfaces, services, icmp-blocks and other settings in zones * Fixed runtime-to-permanent not to save interfaces under control of NM * New icmp-block-inversion flag in the zones * ICMP type filtering in the zones * New services: sip, sips, managesieve * rich rules: Allow destination action (RHBZ#1163428) * firewall-offline-cmd: New option -q/--quiet * firewall-[offline-]cmd: New --add-[zone,service,ipset,icmptype]-from-file * firewall-[offline-]cmd: Fix option for setting the destination address * firewall-config: Fixed resizing behaviour * New transaction model for speed ups in start, restart, stop and other actions * firewall-cmd: New options --load{zone,service,ipset,icmptype}-defaults * Fixed memory leak in dbus_introspection_add_properties * Landscape.io fixes, pylint calm downs OBS-URL: https://build.opensuse.org/request/show/399135 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=17
2016-06-01 12:15:39 +02:00
* firewall-offline-cmd: New option -q/--quiet
* firewall-[offline-]cmd: New --add-[zone,service,ipset,icmptype]-from-file
* firewall-[offline-]cmd: Fix option for setting the destination
address
* firewall-config: Fixed resizing behaviour
* New transaction model for speed ups in start, restart, stop and
other actions
* firewall-cmd: New options --load{zone,service,ipset,icmptype}-defaults
* Fixed memory leak in dbus_introspection_add_properties
* Landscape.io fixes, pylint calm downs
* New D-Bus getXnames methods to speed up firewall-config and firewall-cmd
* ebtables-restore: No support for COMMIT command
* Source port support in services, zones and rich rules
* firewall-offline-cmd: Added --{add,remove}-entries-from-file for ipsets
* firewall-config: New active bindings side bar for simple binding changes
* Reworked NetworkManager module
* Proper default zone handling for NM connections
* Try to set zone binding with NM if interface is under control of NM
* Code cleanup and bug fixes
* Include test suite in the release and install in /usr/share/firewalld/tests
* New Travis-CI configuration file
* Fixed more broken frensh translations
* Translation updates
- Add upstream patches
* 0001-src-firewall-core-Drop-unneeded-python-shebangs.patch: Removes
unneeded python shebangs
* 0002-firewall-core-fw_ifcfg-Quickly-return-if-ifcfg-direc.patch: Do
not try to access the network-scripts ifcfg directory.
- Drop rejected patch
* drop-standard-output-error-systemd.patch
- Minor spec file clean-up
-------------------------------------------------------------------
Fri May 6 20:56:42 UTC 2016 - jengelh@inai.de
- Avoid runtime dependency on systemd, the macros can all deal with
its absence.
-------------------------------------------------------------------
Fri Apr 29 08:27:12 UTC 2016 - mchandras@suse.de
- Suggest the susefirewall2-to-firewalld package which could assist
in migrating the SuSEFirewall2 iptables rules to FirewallD.
Accepting request 391120 from home:markoschandras:network - Update to version 0.4.1.2 * Install fw_nm module * firewalld: Do not fail if log file could not be opened * Make ipsets visible per default in firewall-config * Fixed translations with python3 [changes in 0.4.1.1] * Fix for broken frensh translation [changes in 0.4.1] * Enhancements of ipset handling * No cleanup of ipsets using timeouts while reloading * Only destroy conflicting ipsets * Only use ipset types supported by the system * Add and remove several ipset entries in one call using a file * Reduce time frame where builtin chains are on policy DROP while reloading * Include descriptions in --info-X calls * Command line interface support to get and alter descriptions of zones, * services, ipsets and icmptypes with permanent option * Properly watch changes in combined zones * Fix logging in rich rule forward rules * Transformed direct.passthrough errors into warnings * Rework of import structures * Reduced calls to get ids for port and protocol names (RHBZ#1305434) * Build and installation fixes by Markos Chandras * Provide D-Bus properties in introspection data * Fix for flaws found by landscape.io * Fix for repeated SUGHUP * New NetworkManager module to get and set zones of connections, used in firewall-applet and firewall-config * configure: Autodetect backend tools ({ip,ip6,eb}tables{,-restore}, ipset) * Code cleanups OBS-URL: https://build.opensuse.org/request/show/391120 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=11
2016-04-22 11:08:02 +02:00
-------------------------------------------------------------------
Thu Apr 21 08:15:19 UTC 2016 - mchandras@suse.de
- Update to version 0.4.1.2
* Install fw_nm module
* firewalld: Do not fail if log file could not be opened
* Make ipsets visible per default in firewall-config
* Fixed translations with python3
[changes in 0.4.1.1]
* Fix for broken frensh translation
[changes in 0.4.1]
* Enhancements of ipset handling
* No cleanup of ipsets using timeouts while reloading
* Only destroy conflicting ipsets
* Only use ipset types supported by the system
* Add and remove several ipset entries in one call using a file
* Reduce time frame where builtin chains are on policy DROP while reloading
* Include descriptions in --info-X calls
* Command line interface support to get and alter descriptions of zones,
* services, ipsets and icmptypes with permanent option
* Properly watch changes in combined zones
* Fix logging in rich rule forward rules
* Transformed direct.passthrough errors into warnings
* Rework of import structures
Accepting request 458640 from home:markoschandras:network - Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal OBS-URL: https://build.opensuse.org/request/show/458640 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=38
2017-02-17 10:46:55 +01:00
* Reduced calls to get ids for port and protocol names (rh#1305434)
Accepting request 391120 from home:markoschandras:network - Update to version 0.4.1.2 * Install fw_nm module * firewalld: Do not fail if log file could not be opened * Make ipsets visible per default in firewall-config * Fixed translations with python3 [changes in 0.4.1.1] * Fix for broken frensh translation [changes in 0.4.1] * Enhancements of ipset handling * No cleanup of ipsets using timeouts while reloading * Only destroy conflicting ipsets * Only use ipset types supported by the system * Add and remove several ipset entries in one call using a file * Reduce time frame where builtin chains are on policy DROP while reloading * Include descriptions in --info-X calls * Command line interface support to get and alter descriptions of zones, * services, ipsets and icmptypes with permanent option * Properly watch changes in combined zones * Fix logging in rich rule forward rules * Transformed direct.passthrough errors into warnings * Rework of import structures * Reduced calls to get ids for port and protocol names (RHBZ#1305434) * Build and installation fixes by Markos Chandras * Provide D-Bus properties in introspection data * Fix for flaws found by landscape.io * Fix for repeated SUGHUP * New NetworkManager module to get and set zones of connections, used in firewall-applet and firewall-config * configure: Autodetect backend tools ({ip,ip6,eb}tables{,-restore}, ipset) * Code cleanups OBS-URL: https://build.opensuse.org/request/show/391120 OBS-URL: https://build.opensuse.org/package/show/security:netfilter/firewalld?expand=0&rev=11
2016-04-22 11:08:02 +02:00
* Build and installation fixes by Markos Chandras
* Provide D-Bus properties in introspection data
* Fix for flaws found by landscape.io
* Fix for repeated SUGHUP
* New NetworkManager module to get and set zones of connections, used in
firewall-applet and firewall-config
* configure: Autodetect backend tools ({ip,ip6,eb}tables{,-restore}, ipset)
* Code cleanups
* Bug fixes
- Fix drop-standard-output-error-systemd.patch tagging
- Add libxslt-tools build dependency
-------------------------------------------------------------------
Tue Mar 8 14:27:23 UTC 2016 - mchandras@suse.de
- Do not recommend a specific version for the lang subpackage
-------------------------------------------------------------------
Tue Mar 1 21:51:37 UTC 2016 - mchandras@suse.de
- Move translations to a new subpackage
-------------------------------------------------------------------
Mon Feb 29 09:39:27 UTC 2016 - mchandras@suse.de
- Set DISABLE_RESTART_ON_UPDATE to 'yes' instead of '1'. The macros in
/etc/rpm/macros.systemd only check for the 'yes' value so fix it to
properly prevent the firewalld service from being restarted during
updates.
-------------------------------------------------------------------
Mon Feb 22 13:18:19 UTC 2016 - mchandras@suse.de
- Drop typelib(NetworkManager), NetworkManager-glib, gtk3
and libnotify dependencies (see OBS SR#360792)
-------------------------------------------------------------------
Mon Feb 22 10:18:26 UTC 2016 - jslaby@suse.com
- firewall-config needs typelib(NetworkManager) to run
-------------------------------------------------------------------
Mon Feb 1 11:28:12 UTC 2016 - mchandras@suse.de
- Initial commit. Version 0.4.0
* drop-standard-output-error-systemd.patch (gh#t-woerner/firewalld/pull/67)