firewall-applet-0.5.5-lp150.2.22.2<>,t\/=„f {۟p}TRc|ÇlY(>ٓ%LRf'_3EXčQ@+X5db> u1gu2ΞAxt>DT?Dd % ; 06=~x  0   #  <   ~   ( d a( 8 09 0:S0>y@y'Fy/GyDHyIyXzYz\zD]z^| b}c~tde flu$v wxy<zDT@Cfirewall-applet0.5.5lp150.2.22.2Firewall panel appletThe firewall panel applet provides a status information of firewalld and also the firewall settings.\lamb57nopenSUSE Leap 15.0openSUSEGPL-2.0-or-laterhttp://bugs.opensuse.orgProductivity/Networking/Securityhttp://www.firewalld.orglinuxnoarch/bin/touch --no-create /usr/share/icons/hicolor &>/dev/null || :if [ $1 -eq 0 ] ; then /bin/touch --no-create /usr/share/icons/hicolor &>/dev/null /usr/bin/gtk-update-icon-cache /usr/share/icons/hicolor &>/dev/null || : /usr/bin/glib-compile-schemas /usr/share/glib-2.0/schemas &> /dev/null || : fiq)_cIm R | A큤큤\e\e\g\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\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-0.5.5-lp150.2.22.2.src.rpmconfig(firewall-applet)firewall-applet @    @/bin/sh/bin/sh/bin/sh/usr/bin/python3config(firewall-applet)firewall-configfirewalldhicolor-icon-themepython3-gobjectpython3-qt5rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)typelib(Notify)0.5.5-lp150.2.22.20.5.5-lp150.2.22.20.5.5-lp150.2.22.23.0.4-14.6.0-14.0-15.2-10.74.14.1\A[0[Ѱ@[$@[t[[v[h8@[?Y[Zz@Z3@Z̧@ZZZZZs@Z;@Z@ZOZ@Zr@Z }Z ,@ZY6@XXXEVX)@X2@WiW@W{@WrfWj}WXWM|W,@W#LWV޾VՄ@V2V@V@VHMichał Rostecki Marketa Calabkova Markos Chandras Markos Chandras Markos Chandras Markos Chandras mchandras@suse.demchandras@suse.demchandras@suse.desbrabec@suse.commchandras@suse.desbrabec@suse.comsbrabec@suse.commchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dedimstar@opensuse.orgmchandras@suse.derbrown@suse.commpluskal@suse.commchandras@suse.demchandras@suse.dempluskal@suse.commchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dejengelh@inai.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dejslaby@suse.commchandras@suse.de- Add upstream patch to fix the error in --runtime-to-permanent option about 'settings' variable being referenced before assignment. This error occurs only when NetworkManager is not used. (bsc#1122151) * 0001-firewalld-fix-runtime-to-permanent-if-NM-not-in-use.patch- Import SUSE translations (boo#1108832) * added firewalld-0.5.5-po-20181105.tar.xz- Add upstream patch to fix a python stacktrace when getting the zone for a NetworkManager connection (bsc#1106319) * 0001-firewall-core-fw_nm-nm_get_zone_of_connection-should.patch- Add adapted upstream patch to make --reload/--complete-reload forget the runtime configuration and always load the permanent one (bsc#1112008) * 0001-firewall-core-Always-reload-the-permanent-configurat.patch- Add upstream patch to mark more strings as translatable (bsc#1096542) * 0001-Fix-translating-labels-392.patch - Add upstream patches to fix NetworkManager integration (bsc#1109074) * 0001-fw_nm-Make-nm_get_zone_of_connection-only-check-perm.patch * 0002-firewall-cmd-On-getZoneOfInterface-only-ask-NM-for-p.patch * 0003-firewall-cmd-For-non-permanent-interface-changes-don.patch * 0004-fw_nm-New-function-to-get-all-interfaces-from-NM.patch * 0005-fw_nm-Add-nm_get_interfaces_in_zone.patch * 0006-firewall-cmd-Ask-NM-when-listing-permanent-interface.patch * 0007-firewall-cmd-Allow-passing-extra-interfaces-to-print.patch - Add upstream patch to fix ifcfg ZONE attribute on permanent firewall changes (bsc#1109153) * 0001-ifcfg-Modify-ZONE-on-permanent-config-changes.patch- Update to 0.5.5 (bsc#1108420) * update translations * firewall/core/fw_nm: nm_get_zone_of_connection should return None or empty string instead of False * fw: If direct rules fail to apply add a "Direct" label to error msg * fw: if startup fails on reload, reapply non-perm config that survives reload - spec-cleaner fixes- Update to 0.5.4 (bsc#1105170) * update translations * fw: if failure occurs during startup set state to FAILED * fw_direct: avoid log for untracked passthrough queries * firewall-config: fix some untranslated strings * Rich Rule Masquerade inverted source-destination in Forward Chain * don't forward interface to zone requests to NM for generated interfaces * firewall-cmd: add --check-config option * firewall-offline-cmd: add --check-config option * ipset: check type when parsing ipset definition * firewall-config: Add ipv6-icmp to the protocol dropdown box * core: logger: Remove world-readable bit from logfile * IPv6 rpfilter: explicitly allow neighbor solicitation - Remove patches that have made it upstream: * 0001-firewall-config-fix-some-untranslated-strings.patch * 0001-firewall-config-Add-ipv6-icmp-to-the-protocol-dropdo.patch * 0001-core-logger-Remove-world-readable-bit-from-logfile-3.patch * firewalld-0.5.3-po-20180417.tar.xz- Mark more strings as translatable when creating rich rules (bsc#1096542) * 0001-firewall-config-fix-some-untranslated-strings.patch- Backport the following upstream fixes: * Add missig ipv6-icmp protocol to UI drop-down list (bsc#1099698) - 0001-firewall-config-Add-ipv6-icmp-to-the-protocol-dropdo.patch * Drop global read permissions from the log file (bsc#1098986) - 0001-core-logger-Remove-world-readable-bit-from-logfile-3.patch- Merge SUSE translations to version 0.5.3, fix typos (boo#1094051, add firewalld-0.5.3-po-20180417.tar.xz, remove firewalld-po-20180417.tar.xz).- Update to 0.5.3 (bsc#1093120) * tests/regression: add test for ipset with timeout * ipset: allow adding entries to ipsets with timeout * translations: update * helpers: load helper module explicitly if no port given * helpers: nf_conntrack_proto-* helpers needs name cropped * config/Makefile: correct name of proto-gre helper * tests/regression: test helper nf_conntrack_proto_gre (#263) * functions: get_nf_nat_helpers() should look in other directories too * functions: Allow nf_conntrack_proto_* helpers * services: Add GRE * helpers: Add proto-gre * tests/regression: add test to verify ICMP block in forward chain * ipXtables: fix ICMP block not being present in FORWARD chain- Translations update to version 20180417 (bsc#1081623): * Minor fixes of ar, ko, nl.- Translations update (bsc#1081623).- Backport upstream patches to add additional services (bsc#1082033) * firewalld-add-additional-services.patch- Update to 0.5.2 * fix rule deduplication causing accidental removal of rules * log failure to parse direct rules xml as an error * firewall-config: Break infinite loop when firewalld is not running (bsc#1082470, bsc#1085205) * fix set-log-denied not taking effect * po: update translations - Remove obsolete patches which are now upstream * 0001-src-firewall-config-Fix-default-value-for-dialog-but.patch * 0002-src-firewall-config-Break-infinite-loop-when-firewal.patch- Update to 0.5.1 (bsc#1084026) * ipXtables: fix iptables-restore wait option detection * python3: use "foo in dict" not dict.has_key(foo) * Fix potential python3 keys() incompatibility in watcher * Fixed python3 compatibility * ebtables: fix missing default value to set_rule() * fw_zone: fix invalid reference to __icmp_block_inversion * zones: Correct and defer check_name for combined zones * firewallctl: mark deprecated (gh#firewalld/firewalld##261) * Add nmea-0183 service * Add sycthing-gui service * Add syncthing service * Adding FirewallD jenkins service (gh#firewalld/firewalld#256) * services/high-availability: Add port 9929 * Fix and improve firewalld-sysctls.conf * firewalld: also reload dbus config interface for global options * Add MongoDB service definition * src: firewall: Add support for SUSE ifcfg scripts * Add UPnP client service * firewalld: Allow specifying log file location * firewalld/firewall-offline-cmd: Allow setting system config directories - Drop obsolete patch * 0001-suse-ifcfg-files.patch - Drop tests installation- Add upstream patches to fix endless loop in firewall-config when firewalld is not running (bsc#1082470) * 0001-src-firewall-config-Fix-default-value-for-dialog-but.patch * 0002-src-firewall-config-Break-infinite-loop-when-firewal.patch- Remove high-availability service. SUSE HA uses the cluster service provided by the yast2-cluster package (bsc#1078223)- Introduce new python3-firewall and firewall-macros subpackages. The first one contains the firewalld python3 bindings and the second one contains the RPM macros for firewalld.- Replace dbus-1-python requires with dbus-1-python3: since firewalld was migrated to python3, we also have to require the python3 dependencies (boo#1070310).- Add missing python3-gobject-Gdk dependency (boo#1069952)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Make sure to use python3 everywhere (boo#1068778)- Add combined upstream patch to support SUSE ifcfg network files. * 0001-suse-ifcfg-files.patch (gh#firewalld/firewalld#262, fate#323460)- Update to version 0.4.4.6 * firewall.core.fw_config: Fix check for icmp builtin name * config.services: docker-swarm: fix incorrect attribute * xmlschema/service.xsd: Fix protocol looking for name instead of value * Add docker swarm service (gh#firewalld/firewalld#230) * Adding FirewallD redis service (gh#firewalld/firewalld#248) * Adding firewalld zabbix server and agent services (gh#firewalld/firewalld#221) * firewall-offline-cmd: Don't require root for help output * doc: firewall-cmd: Document --query-* options return codes * firewall-cmd: Use colors only if output is a TTY * core: Log unsupported ICMP types as informational only * add bgp service to predefined services edit to config/Makefile.am * Add git service * Add kprop service * minidlna definitions (gh#firewalld/firewalld#236) * SpiderOak ONE listens on port 21327 and 21328 * autogen.sh: Allow skipping configure via NOCONFIGURE env var * Add missing ports to RH-Satellite-6 service * Reload nf_conntrack sysctls after the module is loaded * Add NFSv3 service. * config/Makefile.am: Add murmur service (a95eed1) * add new service IRC * firewall.core.prog: Simplify runProg output: Combine stderr and stdout * firewall.core.fw: Fix possible dict size change in for loop * firewall.core.fw: Use new firewalld git repo in firewalld organization * config/firewall-config.appdata.xml.in: Use new firewalld git repo in firewalld organization * firewall.core.fw_zone: Rich-rule ICMP type: Error only for conflicting family * firewall.core.rich: Add checks for Rich_Source validation * Handle also IPv6 with the zone masquerade flag * Add IPv6 support for forward-ports in zones * firewall.command: Enable parse_forward_port to work with IPv6 adresses * firewall.core.fw_zone: Fix IPv6 address in rich rule forward ports * add Murmur (Mumble server) service - spec file fixes to avoid rpmlint warnings about duplicate files.- Switch to python3 - Run spec cleaner - Move autogen to build section - Add systemd requirements- Update to version 0.4.4.5 * firewall-offline-cmd: Fix --remove-service-from-zone option (rh#1438127) * Support sctp and dccp in ports, source-ports, forward-ports, helpers and rich rules * firewall-cmd: Fix --{set,get}-{short,description} for zone * firewall.core.ipXtables: Use new wait option for restore commands if available * Adding ovirt-vmconsole service file * Adding oVirt storage-console service. * Adding ctdb service file. * Adding service file for nrpe. * Rename extension for policy choices (server and desktop) to .policy.choice (rh#1449754) * D-Bus interfaces: Fix GetAll for interfaces without properties (rh#1452017) * firewall.core.fw_config: Fix wrong variable use in repr output * firewall.core.fw_icmptype: Add missing import for copy * firewall.core.fw_test: Fix wrong format string in repr * firewall.core.io.zone: Fix getattr use on super(Zone) * firewall.functions: New function get_nf_nat_helpers * firewall.core.fw: Get NAT helpers and store them internally. * firewall.core.fw_zone: Load NAT helpers with conntrack helpers * firewalld.dbus: Add missing properties nf_conntrach_helper_setting and nf_conntrack_helpers * firewall.server.firewalld: New property for NAT helpers supported by the kernel- Update to version 0.4.4.4 * Drop references to fedorahosted.org from spec file and Makefile.am * firewall-config: Show invalid ipset type in the ipset dialog in the bad label * firewall.core.fw: Show icmptypes and ipsets with type errors in permanent env * firewall.server.firewalld: Provide information about the supported icmp types * firewall.core.fw_icmptype: Add ICMP type only if the type is supported * firewall.core.fw: New attributes ip{4,6}tables_supported_icmp_types * firewall.core.ipXtables: New method supported_icmp_types * firewall-config: Deactivate edit buttons if there are no items * firewall.core.io.zone: Fix permanent rich rules using icmp-type (rh#1434594) * firewall.core.fw_ipset: get_ipset may not ckeck if set is applied by default * firewall.core.fw_transaction: Use LastUpdatedOrderedDict for zone transactions - Remove upstream patch: * 0001-firewall.core.fw_ipset-get_ipset-may-not-ckeck-if-se.patch- Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal * firewall-applet: Update active zones and tooltip on reloaded signal * firewall.core.fw_zone: Fix missing chain for helper in rich rules using service (rh#1416578) * Support icmp-type usage in rich rules (rh#1409544) * firewall[-offline]-cmd: Fix --{set,get}-{short,description} for ipset and helper (rh#1416325) * firewall.core.ipset: Solve ipset creation issues with -exist and more flag tests * Speed up start and restart for ipsets with lots of entries (rh#1416817) * Speed up of ipset alteration by adding and removing entries using a file (rh#1416817) * Code cleanup and minor bug fixes * firewall.core.prog: Fix addition of the error output in runProg * New services mssql, kibana, elasticsearch, quassel, bitcoin-rpc, bitcoin-testnet-rpc, bitcoin-testnet, bitcoin and spideroak-lansync * Translation updates - Add upstream patch to fix ipset overloading from /etc/firewalld/ipsets (gh#t-woerner/firewalld#206) * 0001-firewall.core.fw_ipset-get_ipset-may-not-ckeck-if-se.patch- Update to version 0.4.4.2 * firewalld.spec: Added helpers and ipsets paths to firewalld-filesystem * firewall.core.fw_nm: create NMClient lazily * Do not use hard-coded path for modinfo, use autofoo to detect it * firewall.core.io.ifcfg: Dropped invalid option warning with bad format string * firewall.core.io.ifcfg: Properly handle quoted ifcfg values * firewall.core.fw_zone: Do not reset ZONE with ifdown * Updated translations from zanata * firewall-config: Extra grid at bottom to visualize firewalld settings- Update to version 0.4.4.1 * Translation updates form zanata * firewallctl: New support for helpers * firewallctl: Use sys.excepthook to force exception_handler usage always * firewall-config: Use proper source check in sourceDialog- Update to version 0.4.4 * firewall-applet: Use PyQt5 * firewall-config: New nf_conntrack_select dialog, use nf_conntrack_helpers D-Bus property * New helpers Q.931 and RAS from nf_conntrack_h323 * firewall.core.fw_zone: Add zone bingings for PREROUTING in the raw table * firewall.core.ipXtables: Add PREROUTING default rules for zones in raw table * New helper configuration files for amanda, ftp, irc, netbios-ns, pptp, sane, sip, snmp and tftp * firewall-cmd: Fixed --{get,set}-{description,short} for permanent zones * firewall.command: Do not use error code 254 for {ALREADY,NOT}_ENABLED sequences * Misc bug fixes. * For the complete list of changes please see: https://github.com/t-woerner/firewalld/releases/tag/v0.4.4- Relax permissions for default installation files. The files in /usr/lib/firewalld are the default ones as shipped by the package and there is nothing secret in them.- Update to version 0.4.3.3 * Fixes CVE-2016-5410 (bsc#992772) * Standard error is now used for errors and warnings * Several fixes for use in change roots * Systemd service file changes * Fixed translations in firewall-config * Command line clients * Fixes infinite event handling loop in firewall-{config,applet} (bsc#992082)- Update to version 0.4.3.2 * Fix regression with unavailable optional commands * All missing backend messages should be warnings * Individual calls for missing restore commands * Only one authenticate call for add and remove options and also sequences * New service RH-Satellite-6- Update to version 0.4.3.1 * firewall.command: Fix python3 DBusException message not interable error * src/Makefile.am: Fix path in firewall-[offline-]cmd_test.sh while installing * firewallctl: Do not trace back on list command without further arguments * firewallctl (man1): Added remaining sections zone, service, .. * firewallctl: Added runtime-to-permanent, interface and source parser, IndividualCalls setting * firewall.server.config: Allow to set IndividualCalls property in config interface * Fix missing icmp rules for some zones * runProg: Fix issue with running programs * firewall-offline-cmd: Fix issues with missing system-config-firewall * firewall.core.ipXtables: Split up source and dest addresses for transaction * firewall.server.config: Log error in case of loading malformed files in watcher * Install and package the firewallctl man page * Translation updates- Update to version 0.4.3 * New firewallctl utility (rh#1147959) * doc.xml.seealso: Show firewalld.dbus in See Also sections * firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (rh#1339251) * {zone,service,ipset,icmptype}_writer: Do not fail on failed backup * firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd * firewall-cmd: Dropped duplicate setType call in --new-ipset * radius service: Support also tcp ports (RBZ#1219717) * xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources * config.xmlschema.service.xsd: Fix service destination conflicts (rh#1296573) * firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg * firewall.command: Only print summary and description in print_X_info with verbose * firewall.command: print_msg should be able to print empty lines * firewall-config: No processing of runtime passthroughs signals in permanent * Landspace.io fixes and pylint calm downs * firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes * firewall-config: Fixed titles of command and context dialogs, also entry lenths * firewall-config: pylint calm downs * firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit * firewall-config: Use self.active_zoens in conf_zone_added_cb * firewall.command: New parse_port, extended parse methods with more checks * firewall.command: Fixed parse_port to use the separator in the split call * firewall.command: New [de]activate_exception_handler, raise error in parse_X * services ha: Allow corosync-qnetd port * firewall-applet: Support for kde5-nm-connection-editor * tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications * firewall-offline-cmd: Use FirewallCommand for simplification and sequence options * tests/firewall-cmd_test.sh: New tests for service and icmptype modifications * firewall-cmd: Fixed set, remove and query destination options for services * firewall.core.io.service: Source ports have not been checked in _check_config * firewall.core.fw_zone: Method check_source_port is not used, removed * firewall.core.base: Added default to ZONE_TARGETS * firewall.client: Allow to remove ipv:address pair for service destinations * tests/firewall-offline-cmd_test.sh: There is no timeout option in permanent * firewall-cmd: Landscape.io fixes, pylint calm downs * firewall-cmd: Use FirewallCommand for simplification and sequence options * firewall.command: New FirewallCommand for command line client simplification * New services: kshell, rsh, ganglia-master, ganglia-client * firewalld: Cleanup of unused imports, do not translate some deamon messages * firewalld: With fd close interation in runProg, it is not needed here anymore * firewall.core.prog: Add fd close iteration to runProg * firewall.core.fw_nm: Hide NM typelib import, new nm_get_dbus_interface function * firewalld.spec: Require NetworkManager-libnm instead of NetworkManager-glib * firewall-config: New add/remove ipset entries from file, remove all entries * firewall-applet: Fix tooltip after applet start with connection to firewalld * firewall-config: Select new zone, service or icmptype if the view was empty * firewalld.spec: Added build requires for iptables, ebtables and ipset * Adding nf_conntrack_sip module to the service SIP * firewall: core: fw_ifcfg: Quickly return if ifcfg directory does not exist * Drop unneeded python shebangs * Translation updates - Remove obsolete patches: * 0001-src-firewall-core-Drop-unneeded-python-shebangs.patch * 0002-firewall-core-fw_ifcfg-Quickly-return-if-ifcfg-direc.patch * 0003-firewall.core.fw_nm-Hide-NM-typelib-import-new-nm_ge.patch - Add missing %{?_smp_mflags} during install. This will speed up the installation phase as well as expose build system's problems due to higher level of parallelism. - Run make during %build to ensure missing documentation is generated. - spec file cleanups.- Add upstream patch to prevent unconditional dependencies to the NetworkManager typelib (gh#t-woerner/firewalld#119) * 0003-firewall.core.fw_nm-Hide-NM-typelib-import-new-nm_ge.patch- Update to version 0.4.2 * New module to search for and change ifcfg files for interfaces not under control of NM * firewall_config: Enhanced messages in status bar * firewall-config: New message window as overlay if not connected * firewall-config: Fix sentivity of option, view menus and main paned if not connected * firewall-applet: Quit on SIGINT (Ctrl-C), reduced D-Bus calls, some cleanup * firewall-[offline]cmd: Show target in zone information * D-Bus: Completed masquerade methods in FirewallClientZoneSettings * Fixed log-denied rules for icmp-blocks * Keep sorting of interfaces, services, icmp-blocks and other settings in zones * Fixed runtime-to-permanent not to save interfaces under control of NM * New icmp-block-inversion flag in the zones * ICMP type filtering in the zones * New services: sip, sips, managesieve * rich rules: Allow destination action (rh#1163428) * firewall-offline-cmd: New option -q/--quiet * firewall-[offline-]cmd: New --add-[zone,service,ipset,icmptype]-from-file * firewall-[offline-]cmd: Fix option for setting the destination address * firewall-config: Fixed resizing behaviour * New transaction model for speed ups in start, restart, stop and other actions * firewall-cmd: New options --load{zone,service,ipset,icmptype}-defaults * Fixed memory leak in dbus_introspection_add_properties * Landscape.io fixes, pylint calm downs * New D-Bus getXnames methods to speed up firewall-config and firewall-cmd * ebtables-restore: No support for COMMIT command * Source port support in services, zones and rich rules * firewall-offline-cmd: Added --{add,remove}-entries-from-file for ipsets * firewall-config: New active bindings side bar for simple binding changes * Reworked NetworkManager module * Proper default zone handling for NM connections * Try to set zone binding with NM if interface is under control of NM * Code cleanup and bug fixes * Include test suite in the release and install in /usr/share/firewalld/tests * New Travis-CI configuration file * Fixed more broken frensh translations * Translation updates - Add upstream patches * 0001-src-firewall-core-Drop-unneeded-python-shebangs.patch: Removes unneeded python shebangs * 0002-firewall-core-fw_ifcfg-Quickly-return-if-ifcfg-direc.patch: Do not try to access the network-scripts ifcfg directory. - Drop rejected patch * drop-standard-output-error-systemd.patch - Minor spec file clean-up- Avoid runtime dependency on systemd, the macros can all deal with its absence.- Suggest the susefirewall2-to-firewalld package which could assist in migrating the SuSEFirewall2 iptables rules to FirewallD.- Update to version 0.4.1.2 * Install fw_nm module * firewalld: Do not fail if log file could not be opened * Make ipsets visible per default in firewall-config * Fixed translations with python3 [changes in 0.4.1.1] * Fix for broken frensh translation [changes in 0.4.1] * Enhancements of ipset handling * No cleanup of ipsets using timeouts while reloading * Only destroy conflicting ipsets * Only use ipset types supported by the system * Add and remove several ipset entries in one call using a file * Reduce time frame where builtin chains are on policy DROP while reloading * Include descriptions in --info-X calls * Command line interface support to get and alter descriptions of zones, * services, ipsets and icmptypes with permanent option * Properly watch changes in combined zones * Fix logging in rich rule forward rules * Transformed direct.passthrough errors into warnings * Rework of import structures * Reduced calls to get ids for port and protocol names (rh#1305434) * Build and installation fixes by Markos Chandras * Provide D-Bus properties in introspection data * Fix for flaws found by landscape.io * Fix for repeated SUGHUP * New NetworkManager module to get and set zones of connections, used in firewall-applet and firewall-config * configure: Autodetect backend tools ({ip,ip6,eb}tables{,-restore}, ipset) * Code cleanups * Bug fixes - Fix drop-standard-output-error-systemd.patch tagging - Add libxslt-tools build dependency- Do not recommend a specific version for the lang subpackage- Move translations to a new subpackage- Set DISABLE_RESTART_ON_UPDATE to 'yes' instead of '1'. The macros in /etc/rpm/macros.systemd only check for the 'yes' value so fix it to properly prevent the firewalld service from being restarted during updates.- Drop typelib(NetworkManager), NetworkManager-glib, gtk3 and libnotify dependencies (see OBS SR#360792)- firewall-config needs typelib(NetworkManager) to run- Initial commit. Version 0.4.0 * drop-standard-output-error-systemd.patch (gh#t-woerner/firewalld/pull/67)/bin/sh/bin/shlamb57 1553531785 0.5.5-lp150.2.22.20.5.5-lp150.2.22.2 firewallapplet.conffirewall-applet.desktopfirewall-appletfirewall-applet-error.pngfirewall-applet-panic.pngfirewall-applet.pngfirewall-applet-error.pngfirewall-applet-panic.pngfirewall-applet.pngfirewall-applet-error.pngfirewall-applet-panic.pngfirewall-applet.pngfirewall-applet-error.pngfirewall-applet-panic.pngfirewall-applet.pngfirewall-applet-error.pngfirewall-applet-panic.pngfirewall-applet.pngfirewall-applet-error.svgfirewall-applet-panic.svgfirewall-applet.svgfirewall-applet.1.gz/etc//etc/firewall//etc/xdg/autostart//usr/bin//usr/share/icons/hicolor/16x16/apps//usr/share/icons/hicolor/22x22/apps//usr/share/icons/hicolor/24x24/apps//usr/share/icons/hicolor/32x32/apps//usr/share/icons/hicolor/48x48/apps//usr/share/icons/hicolor/scalable/apps//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9867/openSUSE_Leap_15.0_Update/869a01324cf28c51b5c249b6b0b890eb-firewalld.openSUSE_Leap_15.0_Updatedrpmxz5noarch-suse-linux directoryASCII textUTF-8 Unicode textPython script, ASCII text executablePNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedPNG image data, 22 x 22, 8-bit/color RGBA, non-interlacedPNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedPNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedPNG image data, 48 x 48, 8-bit/color RGBA, non-interlacedSVG Scalable Vector Graphics imagetroff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)R R\r̅vlz/usr/bin/gtk-update-icon-cache /usr/share/icons/hicolor &>/dev/null || : /usr/bin/glib-compile-schemas /usr/share/glib-2.0/schemas &> /dev/null || :/bin/shutf-8ab24f9755804e04e72847f20f1a159a8f237da30b66e5e8e4799ec5c424bb20f?7zXZ !t/!F w]"k%4쑓H^5+4H:0,6nC:#bY) +X\@3±cp j1@ęnёOд _j6"N ӣF&m4r2.A{,&eh8&~d ?@i A8#͗Zcq]5o'n1w/ӿSTl/q:ZK'ҳ_e)~u8z(R*^SDr{a$P gE;cڨp56tLb*+="霖rR 7 Ud=Np7a\쿵R\"(bTߦz3%J'ԋLlD݀,B #-@0RTIz:& 1?PnQ@B2NpQ-𻇲õw#kWhDN* Wa[H}.>˔#͍`՞('`/6p٪Zs/ME :vj@?ECw"{.[B!W9rwßvGC1+`SaF%)V_*jDW'\ /Gy |W5`&һ#|*J ?8*: Ëڂp?zI 6l~Li! 椽Q756`^&ufL/C\ e-\g.lڹ!aQDj,?-}-*z0˵v'pD"!@VhnHRϛeTl$UQ}Lso:E܏ -AS8vnWlB[7 [ܷlTꘊKpP^ޙ{d9y8>0Otfk,7 g'>x0NzC-2x5- >V+}~1SB|ݹP炻 Go@V=, \S]G0Y*'ZQ _8_p#_b ԌǏBK^VkiYOsu~8`OM{:QaTee[@ EOp&8祊J.!ME/ISņT3wQ=`"P{ z}Alf (#oP5@>}ۦBGht5ةk"m2J87,B LT[:F9ԩ1F ?4p]".Ԭ(ӗ +˫r78X&[Q!Jy]8Z2@8}B3ZsMW@mpRHE|"v{n],xǬnviy]Cu]!WBkTDMC=&Z si4h5^]/y{)hϊ-+hWCT @I~:owf,{E(#[i5àEgwrziH+(oHi^|S^23.Q(hWTtf 7&Kg"^פ2p} 3~s @yTms?J}2L=*, +rᲗ_Ȼ'5f_ ȿo;5 i妷_v