yast2-firewall-4.2.6-lp152.2.6.1<>,Y`80/=„uzcTdfZUTQu$orbl-^?L2(= }YH &:-XQ  6UxI<#8,RUʫs?"c7} |JrI?W^:ϻi ӴvRl5\" M{ ҔZ<>ؾ#(C|ZYwh+#M8K<1zTڄ~!IřT+!GKدhd$K{FOu8n>DK?Kd # Bx|  BB B B $B B BB:BBt 4<c(p8x>9p>:>B:F:G; BH<BI=BX=`Y=|Z=[=\=B]>B^BLbEcF9dFeFfFlFuFBvGwHBxIByJzJJJJJCyast2-firewall4.2.6lp152.2.6.1YaST2 - Firewall ConfigurationA YaST2 module to be used for configuring a firewall.`80lamb05v@openSUSE Leap 15.2openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgSystem/YaSThttps://github.com/yast/yast-firewalllinuxnoarch C o   ,{7m  X #G8 jy P 4XFA큤AA큤A큤A큤A큤A큤A큤AAA큤A큤A큤AAAA큤AA큤A큤A큤`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`8/`&`8/`8/`8/`8/`8/`8/`8/`8/`80`&`8/`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-firewall-4.2.6-lp152.2.6.1.src.rpmapplication()application(YaST2/org.opensuse.yast.Firewall.desktop)metainfo()metainfo(org.opensuse.yast.Firewall.metainfo.xml)yast2-config-firewallyast2-firewallyast2-trans-firewall    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)yast2yast2-ruby-bindings3.0.4-14.6.0-14.0-15.2-14.1.671.0.0yast2-bootloaderyast2-ycp-ui-bindings4.2.12.17.34.14.1`_@^v^V]]e@\@\\@\HW@\@n@\?\8@\73\4\4\@\&@[=@[H[<@[$@[[[@[R@[][@[z@[4ZZ'ZZ2@Z@ZI@Z@ZZH@Z@Z@Zv@Z$ZyZxG@ZqZaZS]@ZN@ZJosef Reidinger Knut Anderssen Knut Anderssen schubi@suse.deStasiek Michalski jreidinger knut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comjreidinger@suse.comlslezak@suse.czJosef Reidinger schubi@suse.deknut.anderssen@suse.comknut.anderssen@suse.comjreidinger@suse.comStasiek Michalski knut.anderssen@suse.comigonzalezsosa@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comigonzalezsosa@suse.comschubi@suse.deschubi@suse.deschubi@suse.deknut.anderssen@suse.comsnwint@suse.deknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comjreidinger@suse.comschubi@suse.deschubi@suse.demfilka@suse.comknut.anderssen@suse.comgsouza@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comschubi@suse.deknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.comknut.anderssen@suse.commfilka@suse.comgsouza@suse.comigonzalezsosa@suse.commchandras@suse.deigonzalezsosa@suse.comjreidinger@suse.comjreidinger@suse.com- Add to firewall/security proposal option to setup selinux if given product require it. (jsc#SLE-17427) - 4.2.6- Do not enable firewall during first stage of AutoYaST (bsc#1177778) - 4.2.5- Force a reset of the firewalld API instance after modifying the service state (bsc#1166698) - 4.2.4- AutoYaST: Added back the installation finish client for opening the VNC or SSH port during the first stage when used for remote installations (bsc#1161319) - 4.2.3- Set X-SuSE-YaST-AutoInstResource in desktop file (bsc#144894). - 4.2.2- Add metainfo (fate#319035) - Revamp spec - Replace GenericName with Comment - 4.2.1- change proposal naming and add option to set cpu mitigations (bsc#1128707) - 4.2.0- Autoyast: Export zone name explicitly as it has been removed from the common attributes list (bsc#1130354) - Fixed textdomain names - 4.1.11- Autoyast: do not overwrite imported configuration when editing and fixed check for not configured summary (fate#324662) - 4.1.10- Propose to reload the firewalld service after writing instead of restarting it as in other case it will unload kernel modules and terminate existing connections (bsc#1114673, bsc#1121277) - 4.1.9- Autoyast: remove unused options, move export to own class, add support for custom zones in autoyast profile (fate#324662) - 4.1.8- Fixed text domain names (bsc#1121643) - 4.1.7- Ensure that custom zones use unique name (fate#324662) - Explicitly mention that masquerade is IPv4 only (fate#324662) - 4.1.6- Restart running firewalld service if data has been changed. (bsc#1114673) - 4.1.5- AutoYast schema: - Allowed the new 'forward_ports', 'rich_rules' and 'source_ports' elements in zone entries (bsc#1108199) - 4.1.4- Startup dialog: Replace the old UI::ServiceStatus by the new CWM::ServiceWidget (bsc#1114807) - 4.1.3- Add ability to add/edit/remove zone (fate#324662) - Show warning about lost selection only in ncurses and improve text - add confirmation when aborting module - 4.1.2- Provide icon with module (boo#1109310) - 4.1.1- Drop completely old SuSEFirewall2 dialogs and modules. (fate#324662) - 4.1.0- Enable and open the SSH port when only public key authentication is available for the root user (fate#324690). - 4.0.34- Added missing interfaces helpers requirement (fate#324662) - 4.0.33- Fixed zone_options widget test mocking (fate#324662) - 4.0.32- Small improvements to the widget for modifying the assignation of interfaces to zones (fate##324662): - Permits to split the input field entry by any combination of spaces or commas. - Initialize the zone selector with the default zone. - 4.0.31- Alert the user about unsaved changes when leaving the zone services configuration without applying changes (fate#324662) - 4.0.30- AutoYaST configuration: Added support to editing and resetting the current configuration. Improved the writing process (fate324662). - 4.0.29- AutoYast schema: - Allowed the new 'description', 'short' and 'target' elements in zone entries (bsc#1108199) - 4.0.28- Add a new user interface to manage firewalld configuration (fate#324662). - Supported featues: - Manage the firewalld service. - Browse interfaces and assign them to firewall zones. - List zones and design one of them as the default. - Assign services to zones. - Open ports. - 4.0.27- Switched license in spec file from SPDX2 to SPDX3 format. - Changed dir of COPYING file.- Added additional searchkeys to desktop file (fate#321043). - 4.0.26- AutoYaST: Report whether an interface has been defined in more than one zone (bnc#1089855). - 4.0.25- During installation, open services defined by (Tigervnc) instead of the 'vnc-server' service that is shipped with (firewalld) (bsc#1081952). - 4.0.24- consistent wording (open/block) also for VNC ports (bsc#1089789) - 4.0.23- Translate the installation finish client title (bsc#1084136) - 4.0.22- AutoYaST SuSEFirewall2 Importer: Removed FW_LOG_ACCEPT_CRIT tag from the list of supported options as firewalld only log dropped packages and for accepted ones rich rules should be used instead (bsc#1086655) - 4.0.21- More fixes to the firewall AY schema (bsc#1013047) - Added zone 'sources' element to the AutoYaST schema file. - Permitted the use of 'listentry' element in list entries. - 4.0.20- Some fixes to the firewall AY schema (bsc#1013047) - Use "name" in zones - "default_zone" is a firewall attribute - 4.0.19- SuSEFirewall2 importer changes (fate#323460) - Use internal zone instead of trusted when the protection from the INT zone is enabled which fits better with the definition. - Removed the mapping of apache2 and apache2-ssl services to firewalld services since the apache package will provide the services definition and we will not use firewall defaults. - 4.0.18- Added textdomain for translation (bnc#1083015) - 4.0.17- Added textdomain for translation (bnc#1081458) - 4.0.16- Fixed "default_zone" in rnc file. (bnc#1013047) - 4.0.15- fate#323460 - updated summary in autoyast client to work with new firewalld api - 4.0.14- AutoYaST: added 'enable_firewall', 'start_firewall' and 'FW_LOG_DROP_CRIT' to the list of supported properties for SuSEFirewall2 profiles and fixed a typo with 'FW_LOG_DROP_ALL' (fate#323460). - 4.0.13- When firewall is called on ncurses or command line, an error message is presented to the user, informing him to use firewalld (fate#323460). - 4.0.12- AutoYaST: When a profile using the SuSEFirewall2 schema is used, the user is reported with an error if some property is not supported or with a warning in other case. (fate#323460) - 4.0.11- AutoYaST: (fate#323460) * Try to import again during writing in case it was not completed previously (ex: firewalld was not installed). * Enable or disable firewalld depending on the profile - 4.0.10- AutoYaST: fixed default valur for log denied packets when using SuSEFIrewall2 profiles (fate#323460) - 4.0.9- AutoYaST: Added support to set the default zone and export the configuration. (fate#323460) - 4.0.8- AutoYaST: Reading settings only if the firewalld is installed. (fate#323460) - 4.0.7- AutoYaST: Firewalld schema is now the default but SuSEFirewall2 based profiles will still work although not all the properties are supported (#fate#323460) - 4.0.6- Proposal: When the Firewall is disabled, open/close port links are not shown in the proposal and are disabled in the specific proposal dialog (bsc#1068354). - 4.0.5- Do not touch firewalld services if it is not enabled in the proposal (bsc#1067915) - Fixed a SuSEFirewallCmdLine firewalld api call. - 4.0.4- ProposalSettings: fixed an attribute name error when trying to block vnc port (bsc#1067320) - 4.0.3- ProposalSettings: fixed method name when vnc is enable by Linuxrc (bsc#1067320) - 4.0.2- Added missing require (bsc#1067180) - 4.0.1- Remove support for SuSEFirewall2 in firewall client supporting only firewalld (fate#323460) - 4.0.0- bnc#1044045 - do not raise an internal error when pushing Add button when "Service to Allow" list is empty - 3.2.0- Inform the user if start/stop/restart fails bsc#962713 - 3.1.7- Stop generating autodocs (fate#320356) - 3.1.6- Add support for firewalld (fate#318356) * Bump yast2 dependency to 3.1.191 which is the first version to support the firewalld backend. - 3.1.5- fix validation of AutoYaST profiles (bnc#954412) - 3.1.4- remove X-KDE-Library from desktop file (bnc#899104) - 3.1.3- fix breakage of progress in autoinstallation (bnc#845826) - 3.1.2yast2-config-firewallyast2-trans-firewalllamb05 1614295042  !"#$%&'()*+,-./0123456789:;<=>?@AB4.2.6-lp152.2.6.1 clientsfirewall.rbfirewall_auto.rbfirewall_finish.rbfirewall_proposal.rbliby2firewallautoyast.rbclientsauto.rbfirewall.rbinstallation_finish.rbproposal.rbdialogschange_zone.rbmain.rbmodify_zone_interfaces.rbproposal.rbzone.rbimporter_strategiesfirewalld.rbsuse_firewall.rbproposal_settings.rbsummary_presenter.rbui_state.rbwidgetsallowed_services.rbchange_zone_button.rbdefault_zone_button.rbinterfaces_table.rbmodify_zone_interfaces.rboverview_tree.rboverview_tree_pager.rbpagespages.rbinterfaces.rbstartup.rbzone.rbzones.rbproposal.rbservices_table.rbzone.rbzone_button.rbzone_interfaces_button.rbzone_options.rbzones_table.rbschemaautoyastrncfirewall.rncYaST2org.opensuse.yast.Firewall.desktopyast2-firewallREADME.mdiconshicolorscalableappsyast-firewall.svgsymbolicappsyast-firewall-symbolic.svgyast2-firewallCOPYINGmetainfoorg.opensuse.yast.Firewall.metainfo.xml/usr/share/YaST2//usr/share/YaST2/clients//usr/share/YaST2/lib//usr/share/YaST2/lib/y2firewall//usr/share/YaST2/lib/y2firewall/clients//usr/share/YaST2/lib/y2firewall/dialogs//usr/share/YaST2/lib/y2firewall/importer_strategies//usr/share/YaST2/lib/y2firewall/widgets//usr/share/YaST2/lib/y2firewall/widgets/pages//usr/share/YaST2/schema//usr/share/YaST2/schema/autoyast//usr/share/YaST2/schema/autoyast/rnc//usr/share/applications//usr/share/applications/YaST2//usr/share/doc/packages//usr/share/doc/packages/yast2-firewall//usr/share//usr/share/icons//usr/share/icons/hicolor//usr/share/icons/hicolor/scalable//usr/share/icons/hicolor/scalable/apps//usr/share/icons/hicolor/symbolic//usr/share/icons/hicolor/symbolic/apps//usr/share/licenses//usr/share/licenses/yast2-firewall//usr/share//usr/share/metainfo/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15856/openSUSE_Leap_15.2_Update/180c10e2601e201438b5e1e4dc48d749-yast2-firewall.openSUSE_Leap_15.2_Updatedrpmxz5noarch-suse-linuxdirectoryASCII textRuby script, ASCII textRuby script, UTF-8 Unicode textSVG Scalable Vector Graphics imageXML 1.0 document textPPPP3<D >utf-81d283a28f6bd67ce405450485989449c73e6d83c635219399b38df38915a0bdd?7zXZ !t/" ]"k%Z)%K=+r\1{"+,ҸGGP|S!OŦ{h IRD 1>Xuj7G`2oKx{gAo=qe̳7X3لnbTю{/ӱzDqke*QڽۭS0B4uXNcTA:t =]"X&*xd0$wtl:b. q/pib. \qL#RRlA s븈DkX/ b^@dG6Q113zi\a4:oQg ӟ]Yډg/67&ꩅZƗO m+Au=J=@͞A3!Q/a1(qX saEtxiV#V5(<ߛe %Ʈ}J/NHrMDI%cTP^^׾HT2/VƕO0Kw2yV;u |Y2r}% &JAT-Slj`b!U24M33ģDX*gv3|Ao"1&gy-oܜȋ讠<>``{C3?=D&fs|BuCdB2F0#"5ҟ!05 /D5j4-k9o>6*"k#9N,Z? ?,ض6<E <[D عm q3?֏xlfee%<ꭝşGlHx4:q{Q6}zք!cd"y+Q;!9k\ BZvmqw*>0_;?F?[ ;gI!cZoʈdx\ɨp&d~gb7Vx.cΈ n.}c!3>{88#̽ ڜ ִbڵ!S0]NM(kYqC{%}Sfr!)77JikiEFLuaxƙ~1Hjy5I厇S,B$1%b4?ܭxJ験Sm):0,̙Y˙+|1^Di~#YI5;Z7,cK:&nDߊ}["n>cibha ie/踘]~ۯ̩9k$w.OLvTBg^I[_8( 治[`⺡Y4ؾZtA:s m|7ߚVj^>EQw YZ