2011-01-07 15:38:25 +00:00
|
|
|
/firewalld-0.1.2.tar.bz2
|
- new version 0.1.3
- restore all firewall features for reload: panic and virt rules and chains
- string fixes for firewall-cmd man page (by Jiri Popelka)
- fixed firewall-cmd port list (by Jiri Popelka)
- added firewall dbus client connect check to firewall-cmd (by Jiri Popelka)
- translation updates: de, es, gu, it, ja, kn, ml, nl, or, pa, pl, ru, ta,
uk, zh_CN
2011-02-15 17:54:04 +00:00
|
|
|
/firewalld-0.1.3.tar.bz2
|
2012-02-06 23:32:16 +00:00
|
|
|
/firewalld-0.2.0.tar.bz2
|
2012-02-21 12:37:40 +00:00
|
|
|
/firewalld-0.2.1.tar.bz2
|
2012-03-06 12:56:05 +00:00
|
|
|
/firewalld-0.2.2.tar.bz2
|
- firewall-cmd: several changes and fixes
- code cleanup
- fixed icmp protocol used for ipv6 (rhbz#801182)
- added and fixed some comments
- properly restore zone settings, timeout is always set, check for 0
- some FirewallError exceptions were actually not raised
- do not REJECT in each zone
- removeInterface() don't require zone
- new tests in firewall-test script
- dbus_to_python() was ignoring certain values
- added functions for the direct interface: chains, rules, passthrough
- fixed inconsistent data after reload
- some fixes for the direct interface: priority positions are bound to ipv,
table and chain
- added support for direct interface in firewall-cmd:
- added isImmutable(zone) to zone D-Bus interface
- renamed policy file
- enhancements for error messages, enables output for direct.passthrough
- added allow_any to firewald policies, using at leas auth_admin for policies
- replaced ENABLE_FAILED, DISABLE_FAILED, ADD_FAILED and REMOVE_FAILED by
COMMAND_FAILED, resorted error codes
- new firewalld configuration setting CleanupOnExit
- enabled polkit again, found a fix for property problem with slip.dbus.service
- added dhcpv6-client to 'public' (the default) and to 'internal' zones.
- fixed missing settings form zone config files in
"firewall-cmd --list=all --zone=<zone>" call
- added list functions for services and icmptypes, added --list=services and
--list=icmptypes to firewall-cmd
2012-03-15 21:36:11 +00:00
|
|
|
/firewalld-0.2.3.tar.bz2
|
2012-03-16 15:40:37 +00:00
|
|
|
/firewalld-0.2.4.tar.bz2
|
2012-04-20 19:16:48 +00:00
|
|
|
/firewalld-0.2.5.tar.bz2
|
2012-08-07 11:25:11 +00:00
|
|
|
/firewalld-0.2.6.tar.bz2
|
2012-08-13 11:38:11 +00:00
|
|
|
/firewalld-0.2.7.tar.bz2
|
2012-09-07 15:44:38 +00:00
|
|
|
/firewalld-0.2.8.tar.bz2
|
2012-10-17 15:16:19 +00:00
|
|
|
/firewalld-0.2.9.tar.bz2
|
2012-11-20 15:35:51 +00:00
|
|
|
/firewalld-0.2.10.tar.bz2
|
2012-12-11 20:34:31 +00:00
|
|
|
/firewalld-0.2.11.tar.bz2
|
2013-01-14 14:29:15 +00:00
|
|
|
/firewalld-0.2.12.tar.bz2
|
2013-03-20 17:04:20 +00:00
|
|
|
/firewalld-0.3.0.tar.bz2
|
2013-03-28 13:50:52 +00:00
|
|
|
/firewalld-0.3.1.tar.bz2
|
2013-04-30 16:24:00 +00:00
|
|
|
/firewalld-0.3.2.tar.bz2
|
New version 0.3.3
- new service files
- relicensed logger.py under GPLv2+
- firewall-config: sometimes we don't want to use client's exception handler
- When removing Service/IcmpType remove it from zones too (RHBZ#958401)
- firewall-config: work-around masquerade_check_cb() being called more times
- Zone(IO): add interfaces/sources to D-Bus signature
- Added missing UNKNOWN_SOURCE error code
- fw_zone.check_source: Raise INVALID_FAMILY if family is invalid
- New changeZoneOfInterface method, marked changeZone as deprecated
- Fixed firewall-cmd man page entry for --panic-on
- firewall-applet: Fixed possible problems of unescaped strings used for markup
- New support to bind zones to source addresses and ranges (D-BUS, cmd, applet
- Cleanup of unused variables in FirewallD.start
- New firewall/fw_types.py with LastUpdatedOrderedDict
- direct.chains, direct.rules: Using LastUpdatedOrderedDict
- Support splitted zone files
- New reader and writer for stored direct chains and rules
- LockdownWhitelist: fix write(), add get_commands/uids/users/contexts()
- fix service_writer() and icmptype_writer() to put newline at end of file
- firewall-cmd: fix --list-sources
- No need to specify whether source address family is IPv4 or IPv6
- add getZoneOfSource() to D-Bus interface
- Add tests and bash-completion for the new "source" operations
- Convert all input args in D-Bus methods
- setDefaultZone() was calling accessCheck() *after* the action
- New uniqify() function to remove duplicates from list whilst preserving order
- Zone.combine() merge also services and ports
- config/applet: silence DBusException during start when FirewallD is not running (RHBZ#966518)
- firewall-applet: more fixes to make the address sources family agnostic
- Better defaults for lockdown white list
- Use auth_admin_keep for allow_any and allow_inactive also
- New D-Bus API for lockdown policies
- Use IPv4, IPv6 and BRIDGE for FirewallD properties
- Use rich rule action as audit type
- Prototype of string-only D-Bus interface for rich language
- Fixed wrongly merged source family check in firewall/core/io/zone.py
- handle_cmr: report errors, cleanup modules in error case only, mark handling
- Use audit type from rule action, fixed rule output
- Fixed lockdown whitelist D-Bus handling method names
- New rich rule handling in runtime D-Bus interface
- Added interface, source and rich rule handling (runtime and permanent)
- Fixed dbus_obj in FirewallClientConfigPolicies, added queryLockdown
- Write changes in setLockdownWhitelist
- Fixed typo in policies log message in method calls
- firewall-cmd: Added rich rule, lockdown and lockdown whitelist handling
- Don't check access in query/getLockdownWhitelist*()
- firewall-cmd: Also output masquerade flag in --list-all
- firewall-cmd: argparse is able to convert argument to desired type itself
- firewall-cmd_test.sh: tests for permanent interfaces/sources and lockdown whitelist
- Makefile.am: add missing files
- firewall-cmd_test.sh: tests for rich rules
- Added lockdown, source, interface and rich rule docs to firewall-cmd
- Do not masquerade lo if masquerade is enabled in the default zone (RHBZ#904098)
- Use <rule> in metavar for firewall-cmd parser
2013-06-06 16:16:48 +00:00
|
|
|
/firewalld-0.3.3.tar.bz2
|
2013-07-30 18:18:11 +00:00
|
|
|
/firewalld-0.3.4.tar.bz2
|
2013-09-30 12:05:37 +00:00
|
|
|
/firewalld-0.3.5.tar.bz2
|
2013-10-02 14:41:08 +00:00
|
|
|
/firewalld-0.3.6.tar.bz2
|
2013-10-03 09:06:47 +00:00
|
|
|
/firewalld-0.3.6.1.tar.bz2
|
2013-10-04 15:38:32 +00:00
|
|
|
/firewalld-0.3.6.2.tar.bz2
|
2013-10-17 15:30:19 +00:00
|
|
|
/firewalld-0.3.7.tar.bz2
|
2013-11-05 15:06:55 +00:00
|
|
|
/firewalld-0.3.8.tar.bz2
|
2014-01-13 16:22:51 +00:00
|
|
|
/firewalld-0.3.9.tar.bz2
|
2014-01-16 15:11:10 +00:00
|
|
|
/firewalld-0.3.9.1.tar.bz2
|
2014-01-17 06:03:33 +00:00
|
|
|
/firewalld-0.3.9.2.tar.bz2
|
2014-02-05 16:52:17 +00:00
|
|
|
/firewalld-0.3.9.3.tar.bz2
|
2014-05-29 08:34:57 +00:00
|
|
|
/firewalld-0.3.10.tar.bz2
|
2014-08-20 16:53:02 +00:00
|
|
|
/firewalld-0.3.11.tar.bz2
|
2014-10-14 16:20:55 +00:00
|
|
|
/firewalld-0.3.12.tar.bz2
|
2014-12-04 18:13:21 +00:00
|
|
|
/firewalld-0.3.13.tar.bz2
|