diff --git a/.firewalld.metadata b/.firewalld.metadata index 873ef7c..8dea652 100644 --- a/.firewalld.metadata +++ b/.firewalld.metadata @@ -1 +1 @@ -69d687526f2d2483470e5175b246f462fd84ee0b SOURCES/firewalld-0.9.3.tar.gz +e5b8b96e901d81ea8e806f44306acbf73487f3ad SOURCES/firewalld-0.9.11.tar.gz diff --git a/.gitignore b/.gitignore index 047f6a4..5af1705 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1 @@ -SOURCES/firewalld-0.9.3.tar.gz +SOURCES/firewalld-0.9.11.tar.gz diff --git a/SOURCES/0001-RHEL-only-Add-cockpit-by-default-to-some-zones.patch b/SOURCES/0001-RHEL-only-Add-cockpit-by-default-to-some-zones.patch index 4903181..d4722c2 100644 --- a/SOURCES/0001-RHEL-only-Add-cockpit-by-default-to-some-zones.patch +++ b/SOURCES/0001-RHEL-only-Add-cockpit-by-default-to-some-zones.patch @@ -1,7 +1,7 @@ -From 87ecae78c07da6db1faa18504b06345ab3ba51a0 Mon Sep 17 00:00:00 2001 +From feb06c3d50c737183c08fd05592d5c9209f4b966 Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Mon, 9 Jul 2018 11:29:33 -0400 -Subject: [PATCH 01/22] RHEL only: Add cockpit by default to some zones +Subject: [PATCH 01/10] RHEL only: Add cockpit by default to some zones Fixes: #1581578 --- @@ -53,13 +53,13 @@ index 6ea5550a40bd..9609ee6f65c2 100644 + diff --git a/src/tests/functions.at b/src/tests/functions.at -index 582fdcc19314..6b1263b178dc 100644 +index 72db26d5ce0c..2f8183966760 100644 --- a/src/tests/functions.at +++ b/src/tests/functions.at -@@ -105,6 +105,13 @@ m4_define([FWD_START_TEST], [ +@@ -112,6 +112,13 @@ m4_define([FWD_START_TEST], [ + fi m4_ifdef([TESTING_FIREWALL_OFFLINE_CMD], [ - AT_KEYWORDS(offline) + dnl cockpit is added by default downstream, but upstream tests don't expect + dnl it. Simply remove it at the start of every test. + dnl @@ -68,9 +68,9 @@ index 582fdcc19314..6b1263b178dc 100644 + FWD_OFFLINE_CHECK([--zone public --remove-service-from-zone cockpit], 0, [ignore]) + FWD_OFFLINE_CHECK([--zone work --remove-service-from-zone cockpit], 0, [ignore]) ], [ - m4_define_default([FIREWALL_BACKEND], [nftables]) - -@@ -226,6 +233,18 @@ m4_define([FWD_START_TEST], [ + dnl don't unload modules or bother cleaning up, the namespace will be deleted + AT_CHECK([sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf]) +@@ -229,6 +236,18 @@ m4_define([FWD_START_TEST], [ ]) FWD_START_FIREWALLD @@ -90,5 +90,5 @@ index 582fdcc19314..6b1263b178dc 100644 ]) -- -2.27.0 +2.39.1 diff --git a/SOURCES/0002-RHEL-only-default-to-AllowZoneDrifting-yes.patch b/SOURCES/0002-RHEL-only-default-to-AllowZoneDrifting-yes.patch index 9cf03b7..49125ba 100644 --- a/SOURCES/0002-RHEL-only-default-to-AllowZoneDrifting-yes.patch +++ b/SOURCES/0002-RHEL-only-default-to-AllowZoneDrifting-yes.patch @@ -1,7 +1,7 @@ -From bccc66877af7baa95e70c4314e3016ac78c4bbc7 Mon Sep 17 00:00:00 2001 +From 6b88f757186f0b6479c2a334c0c0362a2ba05570 Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Tue, 4 Feb 2020 09:12:17 -0500 -Subject: [PATCH 02/22] RHEL only: default to AllowZoneDrifting=yes +Subject: [PATCH 02/10] RHEL only: default to AllowZoneDrifting=yes --- config/firewalld.conf | 4 ++-- @@ -12,10 +12,10 @@ Subject: [PATCH 02/22] RHEL only: default to AllowZoneDrifting=yes 5 files changed, 10 insertions(+), 5 deletions(-) diff --git a/config/firewalld.conf b/config/firewalld.conf -index 532f0452212e..f791b2358ab8 100644 +index 99d573dcf06f..a0556c0bbf5b 100644 --- a/config/firewalld.conf +++ b/config/firewalld.conf -@@ -71,5 +71,5 @@ RFC3964_IPv4=yes +@@ -73,5 +73,5 @@ RFC3964_IPv4=yes # Note: If "yes" packets will only drift from source based zones to interface # based zones (including the default zone). Packets never drift from interface # based zones to other interfaces based zones (including the default zone). @@ -24,10 +24,10 @@ index 532f0452212e..f791b2358ab8 100644 +# Possible values; "yes", "no". Defaults to "yes". +AllowZoneDrifting=yes diff --git a/doc/xml/firewalld.conf.xml b/doc/xml/firewalld.conf.xml -index fcfbfd2b68c1..c21ef87813bc 100644 +index 8155c547a216..0a6e8f2fdebf 100644 --- a/doc/xml/firewalld.conf.xml +++ b/doc/xml/firewalld.conf.xml -@@ -197,7 +197,7 @@ +@@ -206,7 +206,7 @@ to interface based zones (including the default zone). Packets never drift from interface based zones to other interfaces based zones (including the default zone). @@ -37,7 +37,7 @@ index fcfbfd2b68c1..c21ef87813bc 100644 diff --git a/doc/xml/firewalld.dbus.xml b/doc/xml/firewalld.dbus.xml -index b75067e12c51..d68c775ee5bf 100644 +index da442f3f41b9..1c33ad5ee918 100644 --- a/doc/xml/firewalld.dbus.xml +++ b/doc/xml/firewalld.dbus.xml @@ -2787,7 +2787,7 @@ @@ -60,10 +60,10 @@ index e875e849dec1..0dec7913f694 100644 -FALLBACK_ALLOW_ZONE_DRIFTING = False +FALLBACK_ALLOW_ZONE_DRIFTING = True diff --git a/src/tests/functions.at b/src/tests/functions.at -index 6b1263b178dc..7ac28d514233 100644 +index 2f8183966760..a2989c6345da 100644 --- a/src/tests/functions.at +++ b/src/tests/functions.at -@@ -123,6 +123,11 @@ m4_define([FWD_START_TEST], [ +@@ -126,6 +126,11 @@ m4_define([FWD_START_TEST], [ dnl set the appropriate backend AT_CHECK([sed -i 's/^FirewallBackend.*/FirewallBackend=FIREWALL_BACKEND/' ./firewalld.conf]) @@ -76,5 +76,5 @@ index 6b1263b178dc..7ac28d514233 100644 dnl kernels. m4_if(nftables, FIREWALL_BACKEND, [ -- -2.27.0 +2.39.1 diff --git a/SOURCES/v1.0.0-0003-feat-service-add-galera-service.patch b/SOURCES/0003-v1.0.0-feat-service-add-galera-service-Fixes-rhbz169.patch similarity index 91% rename from SOURCES/v1.0.0-0003-feat-service-add-galera-service.patch rename to SOURCES/0003-v1.0.0-feat-service-add-galera-service-Fixes-rhbz169.patch index 3878c19..ee1db9e 100644 --- a/SOURCES/v1.0.0-0003-feat-service-add-galera-service.patch +++ b/SOURCES/0003-v1.0.0-feat-service-add-galera-service-Fixes-rhbz169.patch @@ -1,7 +1,8 @@ -From 78f004c3cbe01107aadd26771c07e479507f2d62 Mon Sep 17 00:00:00 2001 +From 17a69c4dd7feff3c6101b5541497b8304447ed40 Mon Sep 17 00:00:00 2001 From: Vrinda Punj Date: Tue, 1 Dec 2020 11:58:19 -0500 -Subject: [PATCH 03/22] feat(service): add galera service Fixes: rhbz1696260 +Subject: [PATCH 03/10] v1.0.0: feat(service): add galera service Fixes: + rhbz1696260 (cherry picked from commit 11632147677464cb7121d17526ead242e68be041) --- @@ -51,5 +52,5 @@ index 666eb677855b..249cff8d0d2f 100644 config/services/ganglia-master.xml config/services/git.xml -- -2.27.0 +2.39.1 diff --git a/SOURCES/0004-fix-dbus-conf-setting-deprecated-properties-should-b.patch b/SOURCES/0004-fix-dbus-conf-setting-deprecated-properties-should-b.patch deleted file mode 100644 index 1e1ae7c..0000000 --- a/SOURCES/0004-fix-dbus-conf-setting-deprecated-properties-should-b.patch +++ /dev/null @@ -1,85 +0,0 @@ -From 9c26e2d1eb45c5afc0e6430d2736aeefe9f07cf1 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 25 Jan 2021 11:29:48 -0500 -Subject: [PATCH 04/22] fix(dbus): conf: setting deprecated properties should - be ignored - -They weren't being written to the config file, but the runtime dbus -values were being changed. - -(cherry picked from commit 9001e0cfc18fdcf8526d774fad396414d223c70a) -(cherry picked from commit e8451a455461b5cf177ea8a9aaab7a5e5100991b) ---- - src/firewall/server/config.py | 23 +++++------------------ - src/tests/dbus/firewalld.conf.at | 4 ++-- - 2 files changed, 7 insertions(+), 20 deletions(-) - -diff --git a/src/firewall/server/config.py b/src/firewall/server/config.py -index 1f832a459915..031ef5d1afaa 100644 ---- a/src/firewall/server/config.py -+++ b/src/firewall/server/config.py -@@ -706,22 +706,11 @@ class FirewallDConfig(slip.dbus.service.Object): - self.accessCheck(sender) - - if interface_name == config.dbus.DBUS_INTERFACE_CONFIG: -- if property_name in [ "MinimalMark", "CleanupOnExit", "Lockdown", -+ if property_name in [ "CleanupOnExit", "Lockdown", - "IPv6_rpfilter", "IndividualCalls", -- "LogDenied", "AutomaticHelpers", -+ "LogDenied", - "FirewallBackend", "FlushAllOnReload", - "RFC3964_IPv4", "AllowZoneDrifting" ]: -- if property_name == "MinimalMark": -- try: -- int(new_value) -- except ValueError: -- raise FirewallError(errors.INVALID_MARK, new_value) -- try: -- new_value = str(new_value) -- except: -- raise FirewallError(errors.INVALID_VALUE, -- "'%s' for %s" % \ -- (new_value, property_name)) - if property_name in [ "CleanupOnExit", "Lockdown", - "IPv6_rpfilter", "IndividualCalls" ]: - if new_value.lower() not in [ "yes", "no", -@@ -734,11 +723,6 @@ class FirewallDConfig(slip.dbus.service.Object): - raise FirewallError(errors.INVALID_VALUE, - "'%s' for %s" % \ - (new_value, property_name)) -- if property_name == "AutomaticHelpers": -- if new_value not in config.AUTOMATIC_HELPERS_VALUES: -- raise FirewallError(errors.INVALID_VALUE, -- "'%s' for %s" % \ -- (new_value, property_name)) - if property_name == "FirewallBackend": - if new_value not in config.FIREWALL_BACKEND_VALUES: - raise FirewallError(errors.INVALID_VALUE, -@@ -764,6 +748,9 @@ class FirewallDConfig(slip.dbus.service.Object): - self.config.get_firewalld_conf().write() - self.PropertiesChanged(interface_name, - { property_name: new_value }, [ ]) -+ elif property_name in ["MinimalMark", "AutomaticHelpers"]: -+ # deprecated fields. Ignore setting them. -+ pass - else: - raise dbus.exceptions.DBusException( - "org.freedesktop.DBus.Error.InvalidArgs: " -diff --git a/src/tests/dbus/firewalld.conf.at b/src/tests/dbus/firewalld.conf.at -index cc15318c78dc..9fc5502a8d0b 100644 ---- a/src/tests/dbus/firewalld.conf.at -+++ b/src/tests/dbus/firewalld.conf.at -@@ -37,8 +37,8 @@ $3 - ]) - - dnl Test individual Set/Get --_helper([MinimalMark], [int32:1234], [variant int32 1234]) --_helper([AutomaticHelpers], [string:"no"], [variant string "no"]) -+_helper([MinimalMark], [int32:1234], [variant int32 100]) -+_helper([AutomaticHelpers], [string:"yes"], [variant string "no"]) - _helper([Lockdown], [string:"yes"], [variant string "yes"]) - _helper([LogDenied], [string:"all"], [variant string "all"]) - _helper([IPv6_rpfilter], [string:"yes"], [variant string "yes"]) --- -2.27.0 - diff --git a/SOURCES/v1.0.0-0035-fix-ipset-normalize-entries-in-CIDR-notation.patch b/SOURCES/0004-v1.0.0-fix-ipset-normalize-entries-in-CIDR-notation.patch similarity index 96% rename from SOURCES/v1.0.0-0035-fix-ipset-normalize-entries-in-CIDR-notation.patch rename to SOURCES/0004-v1.0.0-fix-ipset-normalize-entries-in-CIDR-notation.patch index 3257fac..335d5fa 100644 --- a/SOURCES/v1.0.0-0035-fix-ipset-normalize-entries-in-CIDR-notation.patch +++ b/SOURCES/0004-v1.0.0-fix-ipset-normalize-entries-in-CIDR-notation.patch @@ -1,7 +1,7 @@ -From e399840e91c766531923c017ffa00bbc01e7bbe6 Mon Sep 17 00:00:00 2001 +From 430dee713b69a32e5c5bf6b1f68a605564fe93ef Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Fri, 12 Feb 2021 14:23:21 -0500 -Subject: [PATCH 35/36] fix(ipset): normalize entries in CIDR notation +Subject: [PATCH 04/10] v1.0.0: fix(ipset): normalize entries in CIDR notation This will convert things like 10.0.1.0/22 to 10.0.0.0/22. Fix up test cases in which the error code changed due to this. @@ -62,7 +62,7 @@ index 51bf09c8fad6..aa6bd7cd282b 100644 # ipset config diff --git a/src/firewall/core/fw_ipset.py b/src/firewall/core/fw_ipset.py -index 6ebda2d56213..e5348949413c 100644 +index e90082407562..57e0e6cb51db 100644 --- a/src/firewall/core/fw_ipset.py +++ b/src/firewall/core/fw_ipset.py @@ -24,7 +24,8 @@ @@ -83,7 +83,7 @@ index 6ebda2d56213..e5348949413c 100644 IPSet.check_entry(entry, obj.options, obj.type) if entry in obj.entries: -@@ -208,6 +210,7 @@ class FirewallIPSet(object): +@@ -207,6 +209,7 @@ class FirewallIPSet(object): def remove_entry(self, name, entry): obj = self.get_ipset(name, applied=True) @@ -91,7 +91,7 @@ index 6ebda2d56213..e5348949413c 100644 # no entry check for removal if entry not in obj.entries: -@@ -226,6 +229,7 @@ class FirewallIPSet(object): +@@ -224,6 +227,7 @@ class FirewallIPSet(object): def query_entry(self, name, entry): obj = self.get_ipset(name, applied=True) @@ -99,7 +99,7 @@ index 6ebda2d56213..e5348949413c 100644 if "timeout" in obj.options and obj.options["timeout"] != "0": # no entries visible for ipsets with timeout raise FirewallError(errors.IPSET_WITH_TIMEOUT, name) -@@ -239,6 +243,11 @@ class FirewallIPSet(object): +@@ -237,6 +241,11 @@ class FirewallIPSet(object): def set_entries(self, name, entries): obj = self.get_ipset(name, applied=True) @@ -238,5 +238,5 @@ index ede2c45b88c1..a716539a8acf 100644 + -e '/Kernel support protocol versions/d'dnl + -e '/WARNING: ALREADY_ENABLED:/d']) -- -2.27.0 +2.39.1 diff --git a/SOURCES/0005-test-nftables-normalize-reject-statement-output.patch b/SOURCES/0005-test-nftables-normalize-reject-statement-output.patch deleted file mode 100644 index 25a6e7c..0000000 --- a/SOURCES/0005-test-nftables-normalize-reject-statement-output.patch +++ /dev/null @@ -1,29 +0,0 @@ -From 41aee42de0f55e45b55f94a66d31731697e5fc73 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 3 Feb 2021 14:37:44 -0500 -Subject: [PATCH 05/22] test(nftables): normalize reject statement output - -The output became more verbose in nftables commit 7ca3368cd757 ("reject: -Unify inet, netdev and bridge delinearization"). - -(cherry picked from commit 00835e746cf48c73e386d3ad24af7e8fcf3c73ed) -(cherry picked from commit a47186bda1a308a34b5e114a634ae6450d17205b) ---- - src/tests/functions.at | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/src/tests/functions.at b/src/tests/functions.at -index 7ac28d514233..4c8a4603f287 100644 ---- a/src/tests/functions.at -+++ b/src/tests/functions.at -@@ -419,6 +419,7 @@ m4_define([NFT_LIST_RULES_NORMALIZE], [dnl - -e '/type.*hook.*priority.*policy.*/d'dnl - dnl tranform ct state { established,related } to ct state established,related - -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\(@<:@a-z@:>@*\), /\1,/g;}' dnl -+ -e 's/reject with icmp[[x6]]\? type port-unreachable/reject/' dnl - ]) - - m4_define([NFT_LIST_RULES_ALWAYS], [ --- -2.27.0 - diff --git a/SOURCES/v1.0.0-0036-fix-ipset-disallow-overlapping-entries.patch b/SOURCES/0005-v1.0.0-fix-ipset-disallow-overlapping-entries.patch similarity index 96% rename from SOURCES/v1.0.0-0036-fix-ipset-disallow-overlapping-entries.patch rename to SOURCES/0005-v1.0.0-fix-ipset-disallow-overlapping-entries.patch index 78681bb..473840f 100644 --- a/SOURCES/v1.0.0-0036-fix-ipset-disallow-overlapping-entries.patch +++ b/SOURCES/0005-v1.0.0-fix-ipset-disallow-overlapping-entries.patch @@ -1,7 +1,7 @@ -From 3d7ec2dabb164cbc2dce5aa8aa37ae156ebad275 Mon Sep 17 00:00:00 2001 +From bba9a6860dd358791d0be3f075718d7cf8dca261 Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Tue, 23 Feb 2021 09:18:33 -0500 -Subject: [PATCH 36/36] fix(ipset): disallow overlapping entries +Subject: [PATCH 05/10] v1.0.0: fix(ipset): disallow overlapping entries These are already being blocked by the ipset backend, but we should catch them higher up to avoid differences in the backends. @@ -45,7 +45,7 @@ index aa6bd7cd282b..3715ffd29316 100644 else: raise FirewallError(errors.ALREADY_ENABLED, entry) diff --git a/src/firewall/core/fw_ipset.py b/src/firewall/core/fw_ipset.py -index e5348949413c..a285fd4a4aab 100644 +index 57e0e6cb51db..711c86a062be 100644 --- a/src/firewall/core/fw_ipset.py +++ b/src/firewall/core/fw_ipset.py @@ -25,7 +25,7 @@ __all__ = [ "FirewallIPSet" ] @@ -65,7 +65,7 @@ index e5348949413c..a285fd4a4aab 100644 try: for backend in self.backends(): -@@ -245,6 +246,7 @@ class FirewallIPSet(object): +@@ -243,6 +244,7 @@ class FirewallIPSet(object): _entries = set() for _entry in entries: @@ -153,5 +153,5 @@ index b5165d94b220..fd08afd3b57c 100644 -FWD_END_TEST([-e '/ERROR: COMMAND_FAILED:/d']) +FWD_END_TEST([-e '/ERROR: INVALID_ENTRY:/d']) -- -2.27.0 +2.39.1 diff --git a/SOURCES/0006-test-nftables-fix-normalization-of-reject-statement-.patch b/SOURCES/0006-test-nftables-fix-normalization-of-reject-statement-.patch deleted file mode 100644 index 6fdb76f..0000000 --- a/SOURCES/0006-test-nftables-fix-normalization-of-reject-statement-.patch +++ /dev/null @@ -1,29 +0,0 @@ -From f29791c69afc760c2356c9d72d4c1d7333e7b814 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 3 Feb 2021 17:02:42 -0500 -Subject: [PATCH 06/22] test(nftables): fix normalization of reject statement - output for icmpv6 - -Fixes: 00835e746cf4 ("test(nftables): normalize reject statement output") -(cherry picked from commit 3a3b4676ccb7b40cf304b773456dec2662783425) -(cherry picked from commit 3bfef89745cfb2c4d90d721c377a409de9c60611) ---- - src/tests/functions.at | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/tests/functions.at b/src/tests/functions.at -index 4c8a4603f287..562bc6105a8f 100644 ---- a/src/tests/functions.at -+++ b/src/tests/functions.at -@@ -419,7 +419,7 @@ m4_define([NFT_LIST_RULES_NORMALIZE], [dnl - -e '/type.*hook.*priority.*policy.*/d'dnl - dnl tranform ct state { established,related } to ct state established,related - -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\(@<:@a-z@:>@*\), /\1,/g;}' dnl -- -e 's/reject with icmp[[x6]]\? type port-unreachable/reject/' dnl -+ -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/' dnl - ]) - - m4_define([NFT_LIST_RULES_ALWAYS], [ --- -2.27.0 - diff --git a/SOURCES/0047-feat-config-add-CleanupModulesOnExit-configuration-o.patch b/SOURCES/0006-v1.0.0-feat-config-add-CleanupModulesOnExit-configur.patch similarity index 98% rename from SOURCES/0047-feat-config-add-CleanupModulesOnExit-configuration-o.patch rename to SOURCES/0006-v1.0.0-feat-config-add-CleanupModulesOnExit-configur.patch index fdccfe5..f779d0c 100644 --- a/SOURCES/0047-feat-config-add-CleanupModulesOnExit-configuration-o.patch +++ b/SOURCES/0006-v1.0.0-feat-config-add-CleanupModulesOnExit-configur.patch @@ -1,8 +1,8 @@ -From fb11903b8efd287f72e634fb8a4b4ff2034151fe Mon Sep 17 00:00:00 2001 +From 4779d5bf08ff1c24777df4b88b4af2e8e5918f84 Mon Sep 17 00:00:00 2001 From: Paul Laufer <50234787+refual@users.noreply.github.com> Date: Fri, 27 Nov 2020 12:23:11 +0100 -Subject: [PATCH 47/48] feat(config): add CleanupModulesOnExit configuration - option +Subject: [PATCH 06/10] v1.0.0: feat(config): add CleanupModulesOnExit + configuration option Fixes: rhbz 1520532 Fixes: #533 @@ -43,7 +43,7 @@ index a0556c0bbf5b..3abbc9c998c1 100644 # If set to enabled, firewall changes with the D-Bus interface will be limited # to applications that are listed in the lockdown whitelist. diff --git a/doc/xml/firewalld.conf.xml b/doc/xml/firewalld.conf.xml -index 0bf4c2d4d011..dd6ffb214eb3 100644 +index 0a6e8f2fdebf..3ae531bcd94a 100644 --- a/doc/xml/firewalld.conf.xml +++ b/doc/xml/firewalld.conf.xml @@ -88,6 +88,17 @@ @@ -65,7 +65,7 @@ index 0bf4c2d4d011..dd6ffb214eb3 100644 diff --git a/doc/xml/firewalld.dbus.xml b/doc/xml/firewalld.dbus.xml -index d17cb8b6c1ec..466220b40b21 100644 +index 1c33ad5ee918..cc4593e1883f 100644 --- a/doc/xml/firewalld.dbus.xml +++ b/doc/xml/firewalld.dbus.xml @@ -2798,6 +2798,15 @@ @@ -298,5 +298,5 @@ index 9fc5502a8d0b..9a04a3bd491c 100644 _helper([RFC3964_IPv4], [string:"no"], [variant string "no"]) _helper([AllowZoneDrifting], [string:"yes"], [variant string "yes"]) -- -2.31.1 +2.39.1 diff --git a/SOURCES/0048-RHEL-only-default-to-CleanupModulesOnExit-yes.patch b/SOURCES/0007-RHEL-only-default-to-CleanupModulesOnExit-yes.patch similarity index 95% rename from SOURCES/0048-RHEL-only-default-to-CleanupModulesOnExit-yes.patch rename to SOURCES/0007-RHEL-only-default-to-CleanupModulesOnExit-yes.patch index 1d05ba3..b806d77 100644 --- a/SOURCES/0048-RHEL-only-default-to-CleanupModulesOnExit-yes.patch +++ b/SOURCES/0007-RHEL-only-default-to-CleanupModulesOnExit-yes.patch @@ -1,7 +1,7 @@ -From 1aef58a8ff6d232cefcc6bd19ea63c0f071bfee3 Mon Sep 17 00:00:00 2001 +From 82b49bd47d0073f2c2bc4bd296c1a52e4d4d3732 Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Mon, 20 Dec 2021 13:56:55 -0500 -Subject: [PATCH 48/48] RHEL only: default to CleanupModulesOnExit=yes +Subject: [PATCH 07/10] RHEL only: default to CleanupModulesOnExit=yes Resolves: rhbz1980206 --- @@ -28,7 +28,7 @@ index 3abbc9c998c1..c387f87c28be 100644 # Lockdown # If set to enabled, firewall changes with the D-Bus interface will be limited diff --git a/doc/xml/firewalld.conf.xml b/doc/xml/firewalld.conf.xml -index dd6ffb214eb3..12d9f5fc563e 100644 +index 3ae531bcd94a..c94073dbf84f 100644 --- a/doc/xml/firewalld.conf.xml +++ b/doc/xml/firewalld.conf.xml @@ -93,8 +93,8 @@ @@ -91,5 +91,5 @@ index 9a04a3bd491c..68832bca33bc 100644 _helper([RFC3964_IPv4], [string:"no"], [variant string "no"]) _helper([AllowZoneDrifting], [string:"yes"], [variant string "yes"]) -- -2.31.1 +2.39.1 diff --git a/SOURCES/0007-test-functions-increase-debug-level.patch b/SOURCES/0007-test-functions-increase-debug-level.patch deleted file mode 100644 index 5bc8a57..0000000 --- a/SOURCES/0007-test-functions-increase-debug-level.patch +++ /dev/null @@ -1,27 +0,0 @@ -From 9f1e32fd5dea726904ba3fc9373269d15b70dd7d Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Fri, 5 Feb 2021 12:34:01 -0500 -Subject: [PATCH 07/22] test(functions): increase debug level - -(cherry picked from commit 39b7ad4a5568bb65cc46db4b70eb133e8625974f) -(cherry picked from commit f78cc99a67a4b4ef3660703fd2e43db00634b6ca) ---- - src/tests/functions.at | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/tests/functions.at b/src/tests/functions.at -index 562bc6105a8f..631beee6e2d8 100644 ---- a/src/tests/functions.at -+++ b/src/tests/functions.at -@@ -11,7 +11,7 @@ m4_define([FWD_STOP_FIREWALLD], [ - m4_define([FWD_START_FIREWALLD], [ - FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./" - dnl if testsuite ran with debug flag, add debug output -- ${at_debug_p} && FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}" -+ ${at_debug_p} && FIREWALLD_ARGS="--debug=10 ${FIREWALLD_ARGS}" - if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then - FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}" - fi --- -2.27.0 - diff --git a/SOURCES/0008-test-functions-format-xml-output-with-xmllint.patch b/SOURCES/0008-test-functions-format-xml-output-with-xmllint.patch deleted file mode 100644 index 43fb4dd..0000000 --- a/SOURCES/0008-test-functions-format-xml-output-with-xmllint.patch +++ /dev/null @@ -1,27 +0,0 @@ -From a9e05358d0070d4326be0df882f4d480822f4f06 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Fri, 5 Feb 2021 14:50:03 -0500 -Subject: [PATCH 08/22] test(functions): format xml output with xmllint - -(cherry picked from commit 53684e4b3b458b91fe7a71e7c3f8aa3363e5d108) -(cherry picked from commit c509b9a4c0749087e462bbb62a9808a43a74b3d9) ---- - src/tests/functions.at | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/tests/functions.at b/src/tests/functions.at -index 631beee6e2d8..8632f49e442f 100644 ---- a/src/tests/functions.at -+++ b/src/tests/functions.at -@@ -471,7 +471,7 @@ m4_define([DBUS_INTROSPECT], [ - NS_CHECK([PIPESTATUS0([gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1 dnl - m4_ifblank([$1], [--object-path /org/fedoraproject/FirewallD1], - [--object-path /org/fedoraproject/FirewallD1/$1])], dnl -- [m4_ifnblank([$2], [xmllint --xpath '$2' - |]) xmllint --c14n - | TRIM_WHITESPACE])], -+ [m4_ifnblank([$2], [xmllint --xpath '$2' - |]) xmllint --format - | xmllint --c14n - | TRIM_WHITESPACE])], - [$3], [m4_strip([$4])], [m4_strip([$5])], [$6], [$7]) - ]) - --- -2.27.0 - diff --git a/SOURCES/v1.0.0-0049-fix-ipset-reduce-cost-of-entry-overlap-detection.patch b/SOURCES/0008-v1.1.0-fix-ipset-reduce-cost-of-entry-overlap-detect.patch similarity index 96% rename from SOURCES/v1.0.0-0049-fix-ipset-reduce-cost-of-entry-overlap-detection.patch rename to SOURCES/0008-v1.1.0-fix-ipset-reduce-cost-of-entry-overlap-detect.patch index ebebd8b..8e04062 100644 --- a/SOURCES/v1.0.0-0049-fix-ipset-reduce-cost-of-entry-overlap-detection.patch +++ b/SOURCES/0008-v1.1.0-fix-ipset-reduce-cost-of-entry-overlap-detect.patch @@ -1,7 +1,8 @@ -From 34967402eda57d051b239c1551ecc0259881e7d4 Mon Sep 17 00:00:00 2001 +From ae057df0222e6e1dd1556436fad93b669da8f653 Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Tue, 30 Nov 2021 14:54:20 -0500 -Subject: [PATCH 49/51] fix(ipset): reduce cost of entry overlap detection +Subject: [PATCH 08/10] v1.1.0: fix(ipset): reduce cost of entry overlap + detection This increases peak memory usage to reduce the duration it takes to apply the set entries. Building the list of IPv4Network objects up front @@ -45,7 +46,7 @@ index 3715ffd29316..fdc88ac7946b 100644 def addEntry(self, entry): if "timeout" in self.settings[4] and \ diff --git a/src/firewall/core/fw_ipset.py b/src/firewall/core/fw_ipset.py -index a285fd4a4aab..d7878c01921e 100644 +index 711c86a062be..d4bf99eaadcc 100644 --- a/src/firewall/core/fw_ipset.py +++ b/src/firewall/core/fw_ipset.py @@ -25,7 +25,8 @@ __all__ = [ "FirewallIPSet" ] @@ -58,7 +59,7 @@ index a285fd4a4aab..d7878c01921e 100644 from firewall.core.io.ipset import IPSet from firewall import errors from firewall.errors import FirewallError -@@ -244,11 +245,7 @@ class FirewallIPSet(object): +@@ -242,11 +243,7 @@ class FirewallIPSet(object): def set_entries(self, name, entries): obj = self.get_ipset(name, applied=True) @@ -136,5 +137,5 @@ index f33c2a02926f..499ffcb9227a 100644 ",".join(entries)) self.parent.accessCheck(sender) -- -2.31.1 +2.39.1 diff --git a/SOURCES/0009-docs-firewall-cmd-reload-does-not-affect-direct-rule.patch b/SOURCES/0009-docs-firewall-cmd-reload-does-not-affect-direct-rule.patch deleted file mode 100644 index c940cda..0000000 --- a/SOURCES/0009-docs-firewall-cmd-reload-does-not-affect-direct-rule.patch +++ /dev/null @@ -1,43 +0,0 @@ -From 3f5c45753a172bd1c713b318cd530c667a7f41b1 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 23 Dec 2020 09:22:30 -0500 -Subject: [PATCH 09/22] docs(firewall-cmd): reload does not affect direct rules - if FlushAllOnReload=no - -(cherry picked from commit b682ba874ef879797d681fb018ce3c7b9c57efdb) -(cherry picked from commit ab4ce6fb13607dba4f8a0e771455ad34d3adb77a) ---- - doc/xml/firewall-cmd.xml.in | 8 ++++---- - 1 file changed, 4 insertions(+), 4 deletions(-) - -diff --git a/doc/xml/firewall-cmd.xml.in b/doc/xml/firewall-cmd.xml.in -index 3369c2d3f942..691117f3dbff 100644 ---- a/doc/xml/firewall-cmd.xml.in -+++ b/doc/xml/firewall-cmd.xml.in -@@ -133,9 +133,9 @@ - if they have not been also in permanent configuration. - - -- Note: Runtime changes applied via the direct interface are not -+ Note: If FlushAllOnReload=no, runtime changes applied via the direct interface are not - affected and will therefore stay in place until firewalld daemon -- is restarted completely. -+ is restarted completely. For FlushAllOnReload, see firewalld.conf5. - - - -@@ -147,9 +147,9 @@ - Reload firewall completely, even netfilter kernel modules. This will most likely terminate active connections, because state information is lost. This option should only be used in case of severe firewall problems. For example if there are state information problems that no connection can be established with correct firewall rules. - - -- Note: Runtime changes applied via the direct interface are not -+ Note: If FlushAllOnReload=no, runtime changes applied via the direct interface are not - affected and will therefore stay in place until firewalld daemon -- is restarted completely. -+ is restarted completely. For FlushAllOnReload, see firewalld.conf5. - - - --- -2.27.0 - diff --git a/SOURCES/v1.0.0-0050-test-ipset-huge-set-of-entries-benchmark.patch b/SOURCES/0009-v1.1.0-test-ipset-huge-set-of-entries-benchmark.patch similarity index 81% rename from SOURCES/v1.0.0-0050-test-ipset-huge-set-of-entries-benchmark.patch rename to SOURCES/0009-v1.1.0-test-ipset-huge-set-of-entries-benchmark.patch index 32e8a22..f151ea5 100644 --- a/SOURCES/v1.0.0-0050-test-ipset-huge-set-of-entries-benchmark.patch +++ b/SOURCES/0009-v1.1.0-test-ipset-huge-set-of-entries-benchmark.patch @@ -1,7 +1,7 @@ -From 344753267f6b40d029a3b690cce74720a355cb4d Mon Sep 17 00:00:00 2001 +From 885d308c1457e9ea0d839d852dd98a1c134b448c Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Tue, 30 Nov 2021 14:50:17 -0500 -Subject: [PATCH 50/51] test(ipset): huge set of entries benchmark +Subject: [PATCH 09/10] v1.1.0: test(ipset): huge set of entries benchmark Coverage: #881 (cherry picked from commit 114936c71ab1b12a5598d06805b7e9e13f7ee190) @@ -43,14 +43,14 @@ index 000000000000..c7326805b555 + +FWD_END_TEST() diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at -index a20b913fbe59..4045563d0b91 100644 +index 104f784cbe93..143298d3235f 100644 --- a/src/tests/regression/regression.at +++ b/src/tests/regression/regression.at -@@ -45,3 +45,4 @@ m4_include([regression/rhbz1914935.at]) - m4_include([regression/gh696.at]) - m4_include([regression/rhbz1917766.at]) - m4_include([regression/rhbz2014383.at]) +@@ -50,3 +50,4 @@ m4_include([regression/gh874.at]) + m4_include([regression/service_includes_for_builtin.at]) + m4_include([regression/rhbz2181406.at]) + m4_include([regression/ipset_scale.at]) +m4_include([regression/gh881.at]) -- -2.31.1 +2.39.1 diff --git a/SOURCES/0010-docs-dbus-fix-copy-paste-error-for-FlushAllOnReload.patch b/SOURCES/0010-docs-dbus-fix-copy-paste-error-for-FlushAllOnReload.patch deleted file mode 100644 index 7f6bc53..0000000 --- a/SOURCES/0010-docs-dbus-fix-copy-paste-error-for-FlushAllOnReload.patch +++ /dev/null @@ -1,27 +0,0 @@ -From 1e633c4f475e5cc43aca2d2f381abac85718ae22 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 23 Dec 2020 09:54:57 -0500 -Subject: [PATCH 10/22] docs(dbus): fix copy/paste error for FlushAllOnReload - -(cherry picked from commit 63b1f5cfa73071153f732947dcf9ea3064d64970) -(cherry picked from commit e74da4714ca9a64d8891f8fc340a0cab0087d609) ---- - doc/xml/firewalld.dbus.xml | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/doc/xml/firewalld.dbus.xml b/doc/xml/firewalld.dbus.xml -index d68c775ee5bf..57560e93da67 100644 ---- a/doc/xml/firewalld.dbus.xml -+++ b/doc/xml/firewalld.dbus.xml -@@ -2825,7 +2825,7 @@ - - - -- FirewallBackend - s - (rw) -+ FlushAllOnReload - s - (rw) - - - Flush all runtime rules on a reload. Valid options are; yes, no. --- -2.27.0 - diff --git a/SOURCES/v1.0.0-0051-fix-ipset-further-reduce-cost-of-entry-overlap-detec.patch b/SOURCES/0010-v1.1.0-fix-ipset-further-reduce-cost-of-entry-overla.patch similarity index 97% rename from SOURCES/v1.0.0-0051-fix-ipset-further-reduce-cost-of-entry-overlap-detec.patch rename to SOURCES/0010-v1.1.0-fix-ipset-further-reduce-cost-of-entry-overla.patch index 7d1e8a1..748d7b9 100644 --- a/SOURCES/v1.0.0-0051-fix-ipset-further-reduce-cost-of-entry-overlap-detec.patch +++ b/SOURCES/0010-v1.1.0-fix-ipset-further-reduce-cost-of-entry-overla.patch @@ -1,8 +1,8 @@ -From 33b10b9112f2f51df049315438204efec7a5434c Mon Sep 17 00:00:00 2001 +From d8d6d313acd50aa1c87c42fb7a7334b01c516227 Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Tue, 25 Jan 2022 09:29:32 -0500 -Subject: [PATCH 51/51] fix(ipset): further reduce cost of entry overlap - detection +Subject: [PATCH 10/10] v1.1.0: fix(ipset): further reduce cost of entry + overlap detection This makes the complexity linear by sorting the networks ahead of time. @@ -146,5 +146,5 @@ index c7326805b555..a5cf7e4eb912 100644 FWD_END_TEST() -- -2.31.1 +2.39.1 diff --git a/SOURCES/0011-docs-dbus-fix-copy-paste-error-for-RFC3964_IPv4.patch b/SOURCES/0011-docs-dbus-fix-copy-paste-error-for-RFC3964_IPv4.patch deleted file mode 100644 index 91eb70f..0000000 --- a/SOURCES/0011-docs-dbus-fix-copy-paste-error-for-RFC3964_IPv4.patch +++ /dev/null @@ -1,27 +0,0 @@ -From c22d8092863d323eb795cf6f9a27bb70a0743fd0 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 23 Dec 2020 09:55:22 -0500 -Subject: [PATCH 11/22] docs(dbus): fix copy/paste error for RFC3964_IPv4 - -(cherry picked from commit b530915ec8e8f035d363d9dedf226bb20259d0e4) -(cherry picked from commit 35f4ca803cd8042b4541ca0e9f8b2449c3a7c1b4) ---- - doc/xml/firewalld.dbus.xml | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/doc/xml/firewalld.dbus.xml b/doc/xml/firewalld.dbus.xml -index 57560e93da67..d17cb8b6c1ec 100644 ---- a/doc/xml/firewalld.dbus.xml -+++ b/doc/xml/firewalld.dbus.xml -@@ -2867,7 +2867,7 @@ - - - -- FirewallBackend - s - (rw) -+ RFC3964_IPv4 - s - (rw) - - - As per RFC 3964, filter IPv6 traffic with 6to4 destination --- -2.27.0 - diff --git a/SOURCES/0012-test-dbus-direct-add-coverage-for-signatures.patch b/SOURCES/0012-test-dbus-direct-add-coverage-for-signatures.patch deleted file mode 100644 index d7bbd87..0000000 --- a/SOURCES/0012-test-dbus-direct-add-coverage-for-signatures.patch +++ /dev/null @@ -1,379 +0,0 @@ -From e0bc051a52bccdbd17ada7ab974b1c32d25ac7c1 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 8 Feb 2021 14:53:38 -0500 -Subject: [PATCH 12/22] test(dbus): direct: add coverage for signatures - -(cherry picked from commit 4673e0e55353c3f0243035f47d7c2832db9928e4) -(cherry picked from commit 1b1b27ec0c19046ef041d465e44c81ad0f675fc9) ---- - src/tests/dbus/dbus.at | 1 + - src/tests/dbus/direct.at | 348 +++++++++++++++++++++++++++++++++++++++ - 2 files changed, 349 insertions(+) - create mode 100644 src/tests/dbus/direct.at - -diff --git a/src/tests/dbus/dbus.at b/src/tests/dbus/dbus.at -index 5f7b6cbdc108..a9707f825041 100644 ---- a/src/tests/dbus/dbus.at -+++ b/src/tests/dbus/dbus.at -@@ -9,3 +9,4 @@ m4_include([dbus/policy_permanent_signatures.at]) - m4_include([dbus/policy_runtime_signatures.at]) - m4_include([dbus/policy_permanent_functional.at]) - m4_include([dbus/policy_runtime_functional.at]) -+m4_include([dbus/direct.at]) -diff --git a/src/tests/dbus/direct.at b/src/tests/dbus/direct.at -new file mode 100644 -index 000000000000..fe92db6bb510 ---- /dev/null -+++ b/src/tests/dbus/direct.at -@@ -0,0 +1,348 @@ -+FWD_START_TEST([dbus api - direct signatures]) -+AT_KEYWORDS(dbus direct) -+ -+dnl ############################### -+dnl ########## runtime ############ -+dnl ############################### -+ -+DBUS_INTROSPECT([], [[//method[@name="addChain"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="addPassthrough"]]], 0, [dnl -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="addRule"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="getAllChains"]]], 0, [dnl -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="getAllPassthroughs"]]], 0, [dnl -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="getAllRules"]]], 0, [dnl -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="getChains"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="getPassthroughs"]]], 0, [dnl -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="getRules"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="passthrough"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="queryChain"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="queryPassthrough"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="queryRule"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="removeAllPassthroughs"]]], 0, [dnl -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="removeChain"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="removePassthrough"]]], 0, [dnl -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="removeRule"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//method[@name="removeRules"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//signal[@name="ChainAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//signal[@name="ChainRemoved"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//signal[@name="PassthroughAdded"]]], 0, [dnl -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//signal[@name="PassthroughRemoved"]]], 0, [dnl -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//signal[@name="RuleAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([], [[//signal[@name="RuleRemoved"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+]) -+ -+dnl ############################### -+dnl ######### permanent ########### -+dnl ############################### -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getSettings"]]], 0, [dnl -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="update"]]], 0, [dnl -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addChain"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addPassthrough"]]], 0, [dnl -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addRule"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllChains"]]], 0, [dnl -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllPassthroughs"]]], 0, [dnl -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllRules"]]], 0, [dnl -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getChains"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getPassthroughs"]]], 0, [dnl -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getRules"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryChain"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryPassthrough"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryRule"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeChain"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removePassthrough"]]], 0, [dnl -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeRule"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeRules"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) -+ -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//signal[@name="Updated"]]], 0, [dnl -+ -+ -+]) -+ -+FWD_END_TEST --- -2.27.0 - diff --git a/SOURCES/0013-test-dbus-policy-scope-introspection-checks-to-inter.patch b/SOURCES/0013-test-dbus-policy-scope-introspection-checks-to-inter.patch deleted file mode 100644 index 5ad6ad5..0000000 --- a/SOURCES/0013-test-dbus-policy-scope-introspection-checks-to-inter.patch +++ /dev/null @@ -1,119 +0,0 @@ -From 25e0354c7a582df802a54d1dd5bd22462e50f5b3 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Tue, 9 Feb 2021 12:19:53 -0500 -Subject: [PATCH 13/22] test(dbus): policy: scope introspection checks to - interface - -(cherry picked from commit 76c7ef5140de4e578e7409113c26e6c223b8ed60) -(cherry picked from commit 2236a03c212ac9abb173a5d5a5ba68a4f75e7989) ---- - src/tests/dbus/policy_permanent_signatures.at | 18 +++++++++--------- - src/tests/dbus/policy_runtime_signatures.at | 8 ++++---- - 2 files changed, 13 insertions(+), 13 deletions(-) - -diff --git a/src/tests/dbus/policy_permanent_signatures.at b/src/tests/dbus/policy_permanent_signatures.at -index d9dc38179840..7363b7715947 100644 ---- a/src/tests/dbus/policy_permanent_signatures.at -+++ b/src/tests/dbus/policy_permanent_signatures.at -@@ -5,23 +5,23 @@ dnl #################### - dnl Global APIs - dnl #################### - --DBUS_INTROSPECT([config], [[//method[@name="listPolicies"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="listPolicies"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config], [[//method[@name="getPolicyNames"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getPolicyNames"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config], [[//method[@name="getPolicyByName"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getPolicyByName"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([config], [[//method[@name="addPolicy"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addPolicy"]]], 0, [dnl - - - -@@ -37,30 +37,30 @@ DBUS_CHECK([config], [config.getPolicyByName], ["allow-host-ipv6"], 0, [stdout]) - DBUS_POLICY_OBJ=[$(sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout)] - export DBUS_POLICY_OBJ - --DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//method[@name="getSettings"]]], 0, [dnl -+DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="getSettings"]]], 0, [dnl - - - - ]) - --DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//method[@name="update"]]], 0, [dnl -+DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="update"]]], 0, [dnl - - - - ]) - --DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//method[@name="remove"]]], 0, [dnl -+DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="remove"]]], 0, [dnl - - - ]) - --DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//method[@name="rename"]]], 0, [dnl -+DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="rename"]]], 0, [dnl - - - - ]) - --DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//method[@name="loadDefaults"]]], 0, [dnl -+DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="loadDefaults"]]], 0, [dnl - - - ]) -diff --git a/src/tests/dbus/policy_runtime_signatures.at b/src/tests/dbus/policy_runtime_signatures.at -index 2f0c5e75496b..c651ae981adf 100644 ---- a/src/tests/dbus/policy_runtime_signatures.at -+++ b/src/tests/dbus/policy_runtime_signatures.at -@@ -3,13 +3,13 @@ AT_KEYWORDS(dbus policy) - - dnl Settings - dnl --DBUS_INTROSPECT([], [[//method[@name="getPolicySettings"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getPolicySettings"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="setPolicySettings"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="setPolicySettings"]]], 0, [dnl - - - -@@ -17,12 +17,12 @@ DBUS_INTROSPECT([], [[//method[@name="setPolicySettings"]]], 0, [dnl - ]) - - dnl Fetching Policies --DBUS_INTROSPECT([], [[//method[@name="getPolicies"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getPolicies"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getActivePolicies"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getActivePolicies"]]], 0, [dnl - - - --- -2.27.0 - diff --git a/SOURCES/0014-test-dbus-zone-scope-introspection-checks-to-interfa.patch b/SOURCES/0014-test-dbus-zone-scope-introspection-checks-to-interfa.patch deleted file mode 100644 index f1ecd83..0000000 --- a/SOURCES/0014-test-dbus-zone-scope-introspection-checks-to-interfa.patch +++ /dev/null @@ -1,1017 +0,0 @@ -From 8a2baab5205793c5e1ad14ec5a49c16c9fab310a Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Tue, 9 Feb 2021 13:29:02 -0500 -Subject: [PATCH 14/22] test(dbus): zone: scope introspection checks to - interface - -(cherry picked from commit ed6a3cc4f64eb4e778c1a7d336d36dc1ab4f6556) -(cherry picked from commit c2194e87337ebf71d52fffb3761ae4f7bb916e9a) ---- - src/tests/dbus/zone_permanent_signatures.at | 154 ++++++++++---------- - src/tests/dbus/zone_runtime_signatures.at | 110 +++++++------- - 2 files changed, 132 insertions(+), 132 deletions(-) - -diff --git a/src/tests/dbus/zone_permanent_signatures.at b/src/tests/dbus/zone_permanent_signatures.at -index bea47aab16ac..31b27925495a 100644 ---- a/src/tests/dbus/zone_permanent_signatures.at -+++ b/src/tests/dbus/zone_permanent_signatures.at -@@ -5,23 +5,23 @@ dnl #################### - dnl Global APIs - dnl #################### - --DBUS_INTROSPECT([config], [[//method[@name="listZones"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="listZones"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config], [[//method[@name="getZoneNames"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneNames"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config], [[//method[@name="getZoneByName"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneByName"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([config], [[//method[@name="addZone"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addZone"]]], 0, [dnl - - - -@@ -30,13 +30,13 @@ DBUS_INTROSPECT([config], [[//method[@name="addZone"]]], 0, [dnl - ]) - - dnl zone relation to interface/sources --DBUS_INTROSPECT([config], [[//method[@name="getZoneOfInterface"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneOfInterface"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([config], [[//method[@name="getZoneOfSource"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneOfSource"]]], 0, [dnl - - - -@@ -53,29 +53,29 @@ DBUS_CHECK([config], [config.getZoneByName], ["public"], 0, [stdout]) - DBUS_PUBLIC_ZONE_OBJ=[$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)] - export DBUS_PUBLIC_ZONE_OBJ - --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getSettings"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSettings"]]], 0, [dnl - - - - ]) - --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="update"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="update"]]], 0, [dnl - - - - ]) - --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="loadDefaults"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="loadDefaults"]]], 0, [dnl - - - ]) - --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="remove"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="remove"]]], 0, [dnl - - - ]) - --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="rename"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="rename"]]], 0, [dnl - - - -@@ -83,12 +83,12 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="rename" - - dnl Version - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getVersion"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getVersion"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setVersion"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setVersion"]]], 0, [dnl - - - -@@ -96,12 +96,12 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setVers - - dnl Short - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getShort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getShort"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setShort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setShort"]]], 0, [dnl - - - -@@ -109,12 +109,12 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setShor - - dnl Description - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getDescription"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getDescription"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setDescription"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setDescription"]]], 0, [dnl - - - -@@ -122,12 +122,12 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setDesc - - dnl Target - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getTarget"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getTarget"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setTarget"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setTarget"]]], 0, [dnl - - - -@@ -135,27 +135,27 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setTarg - - dnl Interfaces - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getInterfaces"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getInterfaces"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setInterfaces"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setInterfaces"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addInterface"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addInterface"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeInterface"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeInterface"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryInterface"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryInterface"]]], 0, [dnl - - - -@@ -164,27 +164,27 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryIn - - dnl Sources - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getSources"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSources"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setSources"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setSources"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addSource"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addSource"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeSource"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeSource"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="querySource"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="querySource"]]], 0, [dnl - - - -@@ -193,27 +193,27 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="querySo - - dnl Services - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getServices"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getServices"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setServices"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setServices"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addService"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addService"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeService"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeService"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryService"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryService"]]], 0, [dnl - - - -@@ -222,29 +222,29 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="querySe - - dnl Ports - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getPorts"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getPorts"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setPorts"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setPorts"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addPort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addPort"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removePort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removePort"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryPort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryPort"]]], 0, [dnl - - - -@@ -254,29 +254,29 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryPo - - dnl Source Ports - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getSourcePorts"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSourcePorts"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setSourcePorts"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setSourcePorts"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addSourcePort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addSourcePort"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeSourcePort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeSourcePort"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="querySourcePort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="querySourcePort"]]], 0, [dnl - - - -@@ -286,27 +286,27 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="querySo - - dnl Protocol - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getProtocols"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getProtocols"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setProtocols"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setProtocols"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addProtocol"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addProtocol"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeProtocol"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeProtocol"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryProtocol"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryProtocol"]]], 0, [dnl - - - -@@ -315,17 +315,17 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryPr - - dnl Forward Ports - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getForwardPorts"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getForwardPorts"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setForwardPorts"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setForwardPorts"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addForwardPort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addForwardPort"]]], 0, [dnl - - - -@@ -333,7 +333,7 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addForw - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeForwardPort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeForwardPort"]]], 0, [dnl - - - -@@ -341,7 +341,7 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeF - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryForwardPort"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryForwardPort"]]], 0, [dnl - - - -@@ -353,25 +353,25 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryFo - - dnl Masquerade - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getMasquerade"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getMasquerade"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setMasquerade"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setMasquerade"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addMasquerade"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addMasquerade"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeMasquerade"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeMasquerade"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryMasquerade"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryMasquerade"]]], 0, [dnl - - - -@@ -379,27 +379,27 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryMa - - dnl ICMP Block - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getIcmpBlocks"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getIcmpBlocks"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setIcmpBlocks"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setIcmpBlocks"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addIcmpBlock"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addIcmpBlock"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeIcmpBlock"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeIcmpBlock"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryIcmpBlock"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryIcmpBlock"]]], 0, [dnl - - - -@@ -408,25 +408,25 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryIc - - dnl ICMP Block Inversion - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getIcmpBlockInversion"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getIcmpBlockInversion"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setIcmpBlockInversion"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setIcmpBlockInversion"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addIcmpBlockInversion"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addIcmpBlockInversion"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeIcmpBlockInversion"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeIcmpBlockInversion"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryIcmpBlockInversion"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryIcmpBlockInversion"]]], 0, [dnl - - - -@@ -434,27 +434,27 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryIc - - dnl Rich Rules - dnl --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getRichRules"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getRichRules"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="setRichRules"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setRichRules"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="addRichRule"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addRichRule"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="removeRichRule"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeRichRule"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="queryRichRule"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryRichRule"]]], 0, [dnl - - - -@@ -465,7 +465,7 @@ dnl ################### - dnl new dict based APIs - dnl ################### - --DBUS_INTROSPECT([config], [[//method[@name="addZone2"]]], 0, [dnl -+DBUS_INTROSPECT([config], [[//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addZone2"]]], 0, [dnl - - - -@@ -473,13 +473,13 @@ DBUS_INTROSPECT([config], [[//method[@name="addZone2"]]], 0, [dnl - - ]) - --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="getSettings2"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSettings2"]]], 0, [dnl - - - - ]) - --DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//method[@name="update2"]]], 0, [dnl -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="update2"]]], 0, [dnl - - - -diff --git a/src/tests/dbus/zone_runtime_signatures.at b/src/tests/dbus/zone_runtime_signatures.at -index 0b9b030a6612..29571a48ec5f 100644 ---- a/src/tests/dbus/zone_runtime_signatures.at -+++ b/src/tests/dbus/zone_runtime_signatures.at -@@ -5,7 +5,7 @@ dnl #################### - dnl Global APIs - dnl #################### - --DBUS_INTROSPECT([], [[//method[@name="getZoneSettings"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="getZoneSettings"]]], 0, [dnl - - - -@@ -13,37 +13,37 @@ DBUS_INTROSPECT([], [[//method[@name="getZoneSettings"]]], 0, [dnl - ]) - - dnl Default Zone --DBUS_INTROSPECT([], [[//method[@name="getDefaultZone"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="getDefaultZone"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="setDefaultZone"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="setDefaultZone"]]], 0, [dnl - - - - ]) - - dnl Fetching Zones --DBUS_INTROSPECT([], [[//method[@name="getZones"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZones"]]], 0, [dnl - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getActiveZones"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getActiveZones"]]], 0, [dnl - - - - ]) - - dnl Interface/Source --DBUS_INTROSPECT([], [[//method[@name="getZoneOfInterface"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneOfInterface"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getZoneOfSource"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneOfSource"]]], 0, [dnl - - - -@@ -54,7 +54,7 @@ dnl #################### - dnl Zone APIs - dnl #################### - --DBUS_INTROSPECT([], [[//method[@name="isImmutable"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="isImmutable"]]], 0, [dnl - - - -@@ -62,42 +62,42 @@ DBUS_INTROSPECT([], [[//method[@name="isImmutable"]]], 0, [dnl - ]) - - dnl Interfaces --DBUS_INTROSPECT([], [[//method[@name="addInterface"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addInterface"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="changeZone"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZone"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="changeZoneOfInterface"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZoneOfInterface"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeInterface"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeInterface"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryInterface"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryInterface"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getInterfaces"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getInterfaces"]]], 0, [dnl - - - -@@ -105,35 +105,35 @@ DBUS_INTROSPECT([], [[//method[@name="getInterfaces"]]], 0, [dnl - ]) - - dnl Sources --DBUS_INTROSPECT([], [[//method[@name="addSource"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addSource"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="changeZoneOfSource"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZoneOfSource"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeSource"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeSource"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="querySource"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="querySource"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getSources"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getSources"]]], 0, [dnl - - - -@@ -141,7 +141,7 @@ DBUS_INTROSPECT([], [[//method[@name="getSources"]]], 0, [dnl - ]) - - dnl Services --DBUS_INTROSPECT([], [[//method[@name="addService"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addService"]]], 0, [dnl - - - -@@ -149,21 +149,21 @@ DBUS_INTROSPECT([], [[//method[@name="addService"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeService"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeService"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryService"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryService"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getServices"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getServices"]]], 0, [dnl - - - -@@ -171,7 +171,7 @@ DBUS_INTROSPECT([], [[//method[@name="getServices"]]], 0, [dnl - ]) - - dnl Protocols --DBUS_INTROSPECT([], [[//method[@name="addProtocol"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addProtocol"]]], 0, [dnl - - - -@@ -179,21 +179,21 @@ DBUS_INTROSPECT([], [[//method[@name="addProtocol"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeProtocol"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeProtocol"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryProtocol"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryProtocol"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getProtocols"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getProtocols"]]], 0, [dnl - - - -@@ -201,7 +201,7 @@ DBUS_INTROSPECT([], [[//method[@name="getProtocols"]]], 0, [dnl - ]) - - dnl Ports --DBUS_INTROSPECT([], [[//method[@name="addPort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addPort"]]], 0, [dnl - - - -@@ -210,7 +210,7 @@ DBUS_INTROSPECT([], [[//method[@name="addPort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removePort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removePort"]]], 0, [dnl - - - -@@ -218,7 +218,7 @@ DBUS_INTROSPECT([], [[//method[@name="removePort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryPort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryPort"]]], 0, [dnl - - - -@@ -226,7 +226,7 @@ DBUS_INTROSPECT([], [[//method[@name="queryPort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getPorts"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getPorts"]]], 0, [dnl - - - dnl NOTE: The signature is "aas", but getPorts() actually returns -@@ -236,7 +236,7 @@ DBUS_INTROSPECT([], [[//method[@name="getPorts"]]], 0, [dnl - ]) - - dnl Source Ports --DBUS_INTROSPECT([], [[//method[@name="addSourcePort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addSourcePort"]]], 0, [dnl - - - -@@ -245,7 +245,7 @@ DBUS_INTROSPECT([], [[//method[@name="addSourcePort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeSourcePort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeSourcePort"]]], 0, [dnl - - - -@@ -253,7 +253,7 @@ DBUS_INTROSPECT([], [[//method[@name="removeSourcePort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="querySourcePort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="querySourcePort"]]], 0, [dnl - - - -@@ -261,7 +261,7 @@ DBUS_INTROSPECT([], [[//method[@name="querySourcePort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getSourcePorts"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getSourcePorts"]]], 0, [dnl - - - dnl NOTE: The signature is "aas", but getPorts() actually returns -@@ -271,7 +271,7 @@ DBUS_INTROSPECT([], [[//method[@name="getSourcePorts"]]], 0, [dnl - ]) - - dnl Forward Ports --DBUS_INTROSPECT([], [[//method[@name="addForwardPort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addForwardPort"]]], 0, [dnl - - - -@@ -282,7 +282,7 @@ DBUS_INTROSPECT([], [[//method[@name="addForwardPort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeForwardPort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeForwardPort"]]], 0, [dnl - - - -@@ -292,7 +292,7 @@ DBUS_INTROSPECT([], [[//method[@name="removeForwardPort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryForwardPort"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryForwardPort"]]], 0, [dnl - - - -@@ -302,7 +302,7 @@ DBUS_INTROSPECT([], [[//method[@name="queryForwardPort"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getForwardPorts"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getForwardPorts"]]], 0, [dnl - - - dnl NOTE: The signature is "aas", but getPorts() actually returns -@@ -312,20 +312,20 @@ DBUS_INTROSPECT([], [[//method[@name="getForwardPorts"]]], 0, [dnl - ]) - - dnl Masquerade --DBUS_INTROSPECT([], [[//method[@name="addMasquerade"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addMasquerade"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeMasquerade"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeMasquerade"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryMasquerade"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryMasquerade"]]], 0, [dnl - - - -@@ -333,7 +333,7 @@ DBUS_INTROSPECT([], [[//method[@name="queryMasquerade"]]], 0, [dnl - ]) - - dnl ICMP Block --DBUS_INTROSPECT([], [[//method[@name="addIcmpBlock"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addIcmpBlock"]]], 0, [dnl - - - -@@ -341,21 +341,21 @@ DBUS_INTROSPECT([], [[//method[@name="addIcmpBlock"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeIcmpBlock"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeIcmpBlock"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryIcmpBlock"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryIcmpBlock"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getIcmpBlocks"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getIcmpBlocks"]]], 0, [dnl - - - -@@ -363,19 +363,19 @@ DBUS_INTROSPECT([], [[//method[@name="getIcmpBlocks"]]], 0, [dnl - ]) - - dnl ICMP Block Inversion --DBUS_INTROSPECT([], [[//method[@name="addIcmpBlockInversion"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addIcmpBlockInversion"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeIcmpBlockInversion"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeIcmpBlockInversion"]]], 0, [dnl - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryIcmpBlockInversion"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryIcmpBlockInversion"]]], 0, [dnl - - - -@@ -383,7 +383,7 @@ DBUS_INTROSPECT([], [[//method[@name="queryIcmpBlockInversion"]]], 0, [dnl - ]) - - dnl Rich Rules --DBUS_INTROSPECT([], [[//method[@name="addRichRule"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addRichRule"]]], 0, [dnl - - - -@@ -391,21 +391,21 @@ DBUS_INTROSPECT([], [[//method[@name="addRichRule"]]], 0, [dnl - - - ]) --DBUS_INTROSPECT([], [[//method[@name="removeRichRule"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeRichRule"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="queryRichRule"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryRichRule"]]], 0, [dnl - - - - - - ]) --DBUS_INTROSPECT([], [[//method[@name="getRichRules"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getRichRules"]]], 0, [dnl - - - -@@ -416,14 +416,14 @@ dnl ################### - dnl new dict based APIs - dnl ################### - --DBUS_INTROSPECT([], [[//method[@name="getZoneSettings2"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneSettings2"]]], 0, [dnl - - - - - ]) - --DBUS_INTROSPECT([], [[//method[@name="setZoneSettings2"]]], 0, [dnl -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="setZoneSettings2"]]], 0, [dnl - - - --- -2.27.0 - diff --git a/SOURCES/0015-test-dbus-policy-introspect-signals.patch b/SOURCES/0015-test-dbus-policy-introspect-signals.patch deleted file mode 100644 index 5775905..0000000 --- a/SOURCES/0015-test-dbus-policy-introspect-signals.patch +++ /dev/null @@ -1,69 +0,0 @@ -From a97286a71ea39200fdbd6ad876a3b597f9ece6a7 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Tue, 9 Feb 2021 12:20:27 -0500 -Subject: [PATCH 15/22] test(dbus): policy: introspect signals - -(cherry picked from commit 4ef37228e9bb1f564597b4cd654c2092cef0cca8) -(cherry picked from commit 9aac1417b2d10a4793756b4bdfa10047a2240ecd) ---- - src/tests/dbus/policy_permanent_signatures.at | 15 +++++++++++++++ - src/tests/dbus/policy_runtime_signatures.at | 6 ++++++ - 2 files changed, 21 insertions(+) - -diff --git a/src/tests/dbus/policy_permanent_signatures.at b/src/tests/dbus/policy_permanent_signatures.at -index 7363b7715947..9ad36fa131e7 100644 ---- a/src/tests/dbus/policy_permanent_signatures.at -+++ b/src/tests/dbus/policy_permanent_signatures.at -@@ -48,17 +48,32 @@ DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fed - - - ]) -+DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Updated"]]], 0, [dnl -+ -+ -+ -+]) - - DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="remove"]]], 0, [dnl - - - ]) -+DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Removed"]]], 0, [dnl -+ -+ -+ -+]) - - DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="rename"]]], 0, [dnl - - - - ]) -+DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Renamed"]]], 0, [dnl -+ -+ -+ -+]) - - DBUS_INTROSPECT([config/policy/${DBUS_POLICY_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="loadDefaults"]]], 0, [dnl - -diff --git a/src/tests/dbus/policy_runtime_signatures.at b/src/tests/dbus/policy_runtime_signatures.at -index c651ae981adf..e299329e4f4f 100644 ---- a/src/tests/dbus/policy_runtime_signatures.at -+++ b/src/tests/dbus/policy_runtime_signatures.at -@@ -15,6 +15,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.policy"]// - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.policy"]//signal[@name="PolicyUpdated"]]], 0, [dnl -+ -+ -+ -+ -+]) - - dnl Fetching Policies - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getPolicies"]]], 0, [dnl --- -2.27.0 - diff --git a/SOURCES/0016-test-dbus-zone-introspect-signals.patch b/SOURCES/0016-test-dbus-zone-introspect-signals.patch deleted file mode 100644 index 9261907..0000000 --- a/SOURCES/0016-test-dbus-zone-introspect-signals.patch +++ /dev/null @@ -1,369 +0,0 @@ -From c15f2c1b94faf21eb39e4d1c525d205cb1b71dbc Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Tue, 9 Feb 2021 14:31:53 -0500 -Subject: [PATCH 16/22] test(dbus): zone: introspect signals - -(cherry picked from commit 04548b4c3be23288ccaeee74f7b1fda5e9d5e047) -(cherry picked from commit 2f9a05fbaf5882ca91cf4e4141aec27b6f58855c) ---- - src/tests/dbus/zone_permanent_signatures.at | 15 ++ - src/tests/dbus/zone_runtime_signatures.at | 152 ++++++++++++++++++++ - 2 files changed, 167 insertions(+) - -diff --git a/src/tests/dbus/zone_permanent_signatures.at b/src/tests/dbus/zone_permanent_signatures.at -index 31b27925495a..2db55c5b3936 100644 ---- a/src/tests/dbus/zone_permanent_signatures.at -+++ b/src/tests/dbus/zone_permanent_signatures.at -@@ -64,6 +64,11 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org. - - - ]) -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Updated"]]], 0, [dnl -+ -+ -+ -+]) - - DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="loadDefaults"]]], 0, [dnl - -@@ -74,12 +79,22 @@ DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org. - - - ]) -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Removed"]]], 0, [dnl -+ -+ -+ -+]) - - DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="rename"]]], 0, [dnl - - - - ]) -+DBUS_INTROSPECT([config/zone/${DBUS_PUBLIC_ZONE_OBJ}], [[//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Renamed"]]], 0, [dnl -+ -+ -+ -+]) - - dnl Version - dnl -diff --git a/src/tests/dbus/zone_runtime_signatures.at b/src/tests/dbus/zone_runtime_signatures.at -index 29571a48ec5f..68aec78153ae 100644 ---- a/src/tests/dbus/zone_runtime_signatures.at -+++ b/src/tests/dbus/zone_runtime_signatures.at -@@ -69,6 +69,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="InterfaceAdded"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZone"]]], 0, [dnl - - -@@ -76,6 +82,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ZoneChanged"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZoneOfInterface"]]], 0, [dnl - - -@@ -90,6 +102,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="InterfaceRemoved"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryInterface"]]], 0, [dnl - - -@@ -112,6 +130,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourceAdded"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZoneOfSource"]]], 0, [dnl - - -@@ -126,6 +150,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourceRemoved"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="querySource"]]], 0, [dnl - - -@@ -149,6 +179,13 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ServiceAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeService"]]], 0, [dnl - - -@@ -156,6 +193,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ServiceRemoved"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryService"]]], 0, [dnl - - -@@ -179,6 +222,13 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ProtocolAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeProtocol"]]], 0, [dnl - - -@@ -186,6 +236,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ProtocolRemoved"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryProtocol"]]], 0, [dnl - - -@@ -210,6 +266,14 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="PortAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removePort"]]], 0, [dnl - - -@@ -218,6 +282,13 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="PortRemoved"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryPort"]]], 0, [dnl - - -@@ -245,6 +316,14 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourcePortAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeSourcePort"]]], 0, [dnl - - -@@ -253,6 +332,13 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourcePortRemoved"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="querySourcePort"]]], 0, [dnl - - -@@ -282,6 +368,16 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ForwardPortAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeForwardPort"]]], 0, [dnl - - -@@ -292,6 +388,15 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ForwardPortRemoved"]]], 0, [dnl -+ -+ -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryForwardPort"]]], 0, [dnl - - -@@ -319,12 +424,23 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="MasqueradeAdded"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeMasquerade"]]], 0, [dnl - - - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="MasqueradeRemoved"]]], 0, [dnl -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryMasquerade"]]], 0, [dnl - - -@@ -341,6 +457,13 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeIcmpBlock"]]], 0, [dnl - - -@@ -348,6 +471,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockRemoved"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryIcmpBlock"]]], 0, [dnl - - -@@ -369,12 +498,22 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockInversionAdded"]]], 0, [dnl -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeIcmpBlockInversion"]]], 0, [dnl - - - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockInversionRemoved"]]], 0, [dnl -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryIcmpBlockInversion"]]], 0, [dnl - - -@@ -391,6 +530,13 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="RichRuleAdded"]]], 0, [dnl -+ -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeRichRule"]]], 0, [dnl - - -@@ -398,6 +544,12 @@ DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//me - - - ]) -+DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="RichRuleRemoved"]]], 0, [dnl -+ -+ -+ -+ -+]) - DBUS_INTROSPECT([], [[//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryRichRule"]]], 0, [dnl - - --- -2.27.0 - diff --git a/SOURCES/0017-fix-dbus-properties-IPv4-and-IPv6-should-be-true-if-.patch b/SOURCES/0017-fix-dbus-properties-IPv4-and-IPv6-should-be-true-if-.patch deleted file mode 100644 index 380bf9d..0000000 --- a/SOURCES/0017-fix-dbus-properties-IPv4-and-IPv6-should-be-true-if-.patch +++ /dev/null @@ -1,35 +0,0 @@ -From 633f2335b9305514b36b50455063070c4888be61 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 10 Feb 2021 16:35:12 -0500 -Subject: [PATCH 17/22] fix(dbus): properties: IPv4 and IPv6 should be true if - using nftables - -(cherry picked from commit 85feb6cf091d4e03c1175770a7cacb9d994f1126) -(cherry picked from commit 94cc358fe90f4926e588f568edec9fd4efe49370) ---- - src/firewall/server/firewalld.py | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/src/firewall/server/firewalld.py b/src/firewall/server/firewalld.py -index 895e9635d1aa..f74e6e6ae6ff 100644 ---- a/src/firewall/server/firewalld.py -+++ b/src/firewall/server/firewalld.py -@@ -158,13 +158,13 @@ class FirewallD(slip.dbus.service.Object): - return dbus.String(self.fw.get_state()) - - elif prop == "IPv4": -- return dbus.Boolean(self.fw.ip4tables_enabled) -+ return dbus.Boolean(self.fw.is_ipv_enabled("ipv4")) - - elif prop == "IPv4ICMPTypes": - return dbus.Array(self.fw.ipv4_supported_icmp_types, "s") - - elif prop == "IPv6": -- return dbus.Boolean(self.fw.ip6tables_enabled) -+ return dbus.Boolean(self.fw.is_ipv_enabled("ipv6")) - - elif prop == "IPv6_rpfilter": - return dbus.Boolean(self.fw.ipv6_rpfilter_enabled) --- -2.27.0 - diff --git a/SOURCES/0018-test-ipset-add-missing-CHECK_IPSET.patch b/SOURCES/0018-test-ipset-add-missing-CHECK_IPSET.patch deleted file mode 100644 index 696128a..0000000 --- a/SOURCES/0018-test-ipset-add-missing-CHECK_IPSET.patch +++ /dev/null @@ -1,52 +0,0 @@ -From 04b9b7138e4af55f56a82f0b3727b0e70de3a5a0 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Thu, 11 Feb 2021 15:10:04 -0500 -Subject: [PATCH 18/22] test(ipset): add missing CHECK_IPSET - -(cherry picked from commit 61a2f56e889f5a370e28bf98f8dcf2e864a01283) -(cherry picked from commit 95f18c89e22271ec437377f8fed753997f5828aa) ---- - src/tests/regression/gh567.at | 1 + - src/tests/regression/rhbz1779835.at | 10 +++++++++- - 2 files changed, 10 insertions(+), 1 deletion(-) - -diff --git a/src/tests/regression/gh567.at b/src/tests/regression/gh567.at -index 03c3bde4a0fe..7faa9a5b0291 100644 ---- a/src/tests/regression/gh567.at -+++ b/src/tests/regression/gh567.at -@@ -1,5 +1,6 @@ - FWD_START_TEST([rich rule source w/ mark action]) - AT_KEYWORDS(gh567 rich ipset) -+CHECK_IPSET - - FWD_CHECK([-q --permanent --new-ipset=Teste --type=hash:net]) - FWD_CHECK([-q --permanent --add-rich-rule "rule family=ipv4 source ipset=Teste mark set=2"]) -diff --git a/src/tests/regression/rhbz1779835.at b/src/tests/regression/rhbz1779835.at -index 8de5c0353b6e..1c6738bce468 100644 ---- a/src/tests/regression/rhbz1779835.at -+++ b/src/tests/regression/rhbz1779835.at -@@ -1,5 +1,6 @@ - FWD_START_TEST([ipv6 address with brackets]) --AT_KEYWORDS(rhbz1779835 ipset zone forward_port rich) -+AT_KEYWORDS(rhbz1779835 ipset) -+CHECK_IPSET - - IF_HOST_SUPPORTS_IPV6_RULES([], [AT_SKIP_IF([:])]) - -@@ -10,6 +11,13 @@ FWD_CHECK([-q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6]) - FWD_CHECK([[-q --permanent --ipset foobar2 --add-entry='[1234::]/64']]) - FWD_RELOAD - -+FWD_END_TEST -+ -+FWD_START_TEST([ipv6 address with brackets]) -+AT_KEYWORDS(rhbz1779835 zone forward_port rich) -+ -+IF_HOST_SUPPORTS_IPV6_RULES([], [AT_SKIP_IF([:])]) -+ - dnl zone source - FWD_CHECK([[-q --zone internal --add-source='[::1234]']]) - FWD_CHECK([[-q --zone internal --add-source='[1234::]/64']]) --- -2.27.0 - diff --git a/SOURCES/0019-fix-fw-when-checking-tables-make-sure-to-check-the-a.patch b/SOURCES/0019-fix-fw-when-checking-tables-make-sure-to-check-the-a.patch deleted file mode 100644 index ec343aa..0000000 --- a/SOURCES/0019-fix-fw-when-checking-tables-make-sure-to-check-the-a.patch +++ /dev/null @@ -1,48 +0,0 @@ -From 0ada4672b42c426de1ffc7f3ae2416629225369f Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 15 Feb 2021 09:53:02 -0500 -Subject: [PATCH 19/22] fix(fw): when checking tables make sure to check the - actual backend - -Calling get_backend_by_ipv() will return nftables if we're using -nftables backend, but we really need to check if iptables, et al. are -available. - -(cherry picked from commit 48d97fb40929afbc1b0bc82759ad75b1937f6e3f) -(cherry picked from commit fba59a99735ec46d787141350564137abfec0c87) ---- - src/firewall/core/fw.py | 12 ++++++------ - 1 file changed, 6 insertions(+), 6 deletions(-) - -diff --git a/src/firewall/core/fw.py b/src/firewall/core/fw.py -index 15284a4929e9..3eb54e37ab5c 100644 ---- a/src/firewall/core/fw.py -+++ b/src/firewall/core/fw.py -@@ -131,18 +131,18 @@ class Firewall(object): - def _check_tables(self): - # check if iptables, ip6tables and ebtables are usable, else disable - if self.ip4tables_enabled and \ -- "filter" not in self.get_backend_by_ipv("ipv4").get_available_tables(): -- log.warning("iptables not usable, disabling IPv4 firewall.") -+ "filter" not in self.ip4tables_backend.get_available_tables(): -+ log.info1("iptables is not usable.") - self.ip4tables_enabled = False - - if self.ip6tables_enabled and \ -- "filter" not in self.get_backend_by_ipv("ipv6").get_available_tables(): -- log.warning("ip6tables not usable, disabling IPv6 firewall.") -+ "filter" not in self.ip6tables_backend.get_available_tables(): -+ log.info1("ip6tables is not usable.") - self.ip6tables_enabled = False - - if self.ebtables_enabled and \ -- "filter" not in self.get_backend_by_ipv("eb").get_available_tables(): -- log.warning("ebtables not usable, disabling ethernet bridge firewall.") -+ "filter" not in self.ebtables_backend.get_available_tables(): -+ log.info1("ebtables is not usable.") - self.ebtables_enabled = False - - # is there at least support for ipv4 or ipv6 --- -2.27.0 - diff --git a/SOURCES/0020-fix-ipset-nftables-use-interval-flag-for-ip-types.patch b/SOURCES/0020-fix-ipset-nftables-use-interval-flag-for-ip-types.patch deleted file mode 100644 index 5cded79..0000000 --- a/SOURCES/0020-fix-ipset-nftables-use-interval-flag-for-ip-types.patch +++ /dev/null @@ -1,118 +0,0 @@ -From 12b83f9c9381e60496a63082343512e62b03de5f Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 22 Feb 2021 15:11:21 -0500 -Subject: [PATCH 20/22] fix(ipset): nftables: use interval flag for "ip" types - -This is to be compatible with ipset. ipset allows adding to a non-mask -type, e.g. "ip", by using a mask. ipset translates this into many -entries. Support it in nftables simply by using intervals. - -(cherry picked from commit faaf3ac649a347f0bccae800fd0e4daeebbd1539) -(cherry picked from commit c9d1c88e91c84561af0dbfb5999f722a3b6bb397) ---- - src/firewall/core/nftables.py | 2 +- - src/tests/cli/firewall-cmd.at | 1 + - src/tests/regression/gh330.at | 6 ++++++ - src/tests/regression/rhbz1734765.at | 2 ++ - 4 files changed, 10 insertions(+), 1 deletion(-) - -diff --git a/src/firewall/core/nftables.py b/src/firewall/core/nftables.py -index ff077aded340..e6907421e111 100644 ---- a/src/firewall/core/nftables.py -+++ b/src/firewall/core/nftables.py -@@ -1767,7 +1767,7 @@ class nftables(object): - - # Some types need the interval flag - for t in type.split(":")[1].split(","): -- if t in ["net", "port"]: -+ if t in ["ip", "net", "port"]: - set_dict["flags"] = ["interval"] - break - -diff --git a/src/tests/cli/firewall-cmd.at b/src/tests/cli/firewall-cmd.at -index 67af8a19c072..450737776a9f 100644 ---- a/src/tests/cli/firewall-cmd.at -+++ b/src/tests/cli/firewall-cmd.at -@@ -974,6 +974,7 @@ FWD_START_TEST([ipset]) - table inet firewalld { - set foobar { - type ipv4_addr . mark -+ flags interval - elements = { 10.10.10.10 . 0x00000100, - 20.20.20.20 . 0x00000200 } - } -diff --git a/src/tests/regression/gh330.at b/src/tests/regression/gh330.at -index fd8d2f8d2dd8..0564501aa18d 100644 ---- a/src/tests/regression/gh330.at -+++ b/src/tests/regression/gh330.at -@@ -17,6 +17,7 @@ NFT_LIST_SET([foobar], 0, [dnl - table inet firewalld { - set foobar { - type ipv4_addr -+ flags interval - elements = { 1.2.3.4 } - } - } -@@ -43,6 +44,7 @@ NFT_LIST_SET([foobar], 0, [dnl - table inet firewalld { - set foobar { - type ipv4_addr -+ flags interval - elements = { 1.2.3.4, 10.10.10.10 } - } - } -@@ -60,6 +62,7 @@ NFT_LIST_SET([foobar], 0, [dnl - table inet firewalld { - set foobar { - type ipv4_addr -+ flags interval - elements = { 1.2.3.4, 10.10.10.10 } - } - } -@@ -80,6 +83,7 @@ NFT_LIST_SET([foobar], 0, [dnl - table inet firewalld { - set foobar { - type ipv4_addr -+ flags interval - elements = { 1.2.3.4, 4.3.2.1, - 10.10.10.10 } - } -@@ -104,6 +108,7 @@ NFT_LIST_SET([foobar], 0, [dnl - table inet firewalld { - set foobar { - type ipv4_addr -+ flags interval - elements = { 1.2.3.4, 4.3.2.1, - 6.6.6.6, 10.10.10.10 } - } -@@ -129,6 +134,7 @@ NFT_LIST_SET([foobar], 0, [dnl - table inet firewalld { - set foobar { - type ipv4_addr -+ flags interval - elements = { 1.2.3.4 } - } - } -diff --git a/src/tests/regression/rhbz1734765.at b/src/tests/regression/rhbz1734765.at -index b9f6aa5d49a1..b5023a058a55 100644 ---- a/src/tests/regression/rhbz1734765.at -+++ b/src/tests/regression/rhbz1734765.at -@@ -47,6 +47,7 @@ NFT_LIST_SET([ipsetv4], 0, [dnl - table inet firewalld { - set ipsetv4 { - type ipv4_addr -+ flags interval - elements = { 192.0.2.12 } - } - } -@@ -55,6 +56,7 @@ NFT_LIST_SET([ipsetv6], 0, [dnl - table inet firewalld { - set ipsetv6 { - type ipv6_addr -+ flags interval - elements = { ::2 } - } - } --- -2.27.0 - diff --git a/SOURCES/0021-test-ipset-verify-ipset-netmask-allowed-for-hash-ip.patch b/SOURCES/0021-test-ipset-verify-ipset-netmask-allowed-for-hash-ip.patch deleted file mode 100644 index cbace62..0000000 --- a/SOURCES/0021-test-ipset-verify-ipset-netmask-allowed-for-hash-ip.patch +++ /dev/null @@ -1,54 +0,0 @@ -From 8adac165dc93d28802c645a3626a3bcf29503ace Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 15 Feb 2021 11:29:07 -0500 -Subject: [PATCH 21/22] test(ipset): verify ipset netmask allowed for hash:ip - -(cherry picked from commit b7718f0dfa9ce7247911ef49c62e3ef2e4208343) -(cherry picked from commit 1fd50036a51b6147f9e77d61d7e63c8a8e564756) ---- - src/tests/regression/ipset_netmask_allowed.at | 23 +++++++++++++++++++ - src/tests/regression/regression.at | 1 + - 2 files changed, 24 insertions(+) - create mode 100644 src/tests/regression/ipset_netmask_allowed.at - -diff --git a/src/tests/regression/ipset_netmask_allowed.at b/src/tests/regression/ipset_netmask_allowed.at -new file mode 100644 -index 000000000000..b5165d94b220 ---- /dev/null -+++ b/src/tests/regression/ipset_netmask_allowed.at -@@ -0,0 +1,23 @@ -+FWD_START_TEST([ipset netmask allowed type hash:ip]) -+AT_KEYWORDS(ipset reload) -+ -+FWD_CHECK([--permanent --new-ipset foobar --type hash:ip], 0, [ignore]) -+FWD_RELOAD -+ -+dnl ipset allows specifying a mask for hash:ip, but it will translate it into -+dnl an add for the whole range. i.e. 1.2.3.4/24 --> 1.2.3.[0.255] (256 -+dnl entries). -+dnl -+dnl In nftables, we allow this by using actual intervals. -+FWD_CHECK([--permanent --ipset foobar --add-entry 1.2.3.0/24], 0, [ignore]) -+FWD_CHECK([ --ipset foobar --add-entry 1.2.3.0/24], 0, [ignore]) -+ -+dnl check the edge case -+FWD_CHECK([--permanent --ipset foobar --add-entry 4.3.2.1/32], 0, [ignore]) -+FWD_CHECK([ --ipset foobar --add-entry 4.3.2.1/32], 0, [ignore]) -+ -+dnl overlaps should be denied by ipset -+FWD_CHECK([ --ipset foobar --add-entry 1.2.3.0/22], 13, [ignore], [ignore]) -+FWD_CHECK([ --ipset foobar --add-entry 1.2.3.0/30], 13, [ignore], [ignore]) -+ -+FWD_END_TEST([-e '/ERROR: COMMAND_FAILED:/d']) -diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at -index a90fc37d51c6..a49bb3b756e7 100644 ---- a/src/tests/regression/regression.at -+++ b/src/tests/regression/regression.at -@@ -38,3 +38,4 @@ m4_include([regression/rhbz1855140.at]) - m4_include([regression/rhbz1871298.at]) - m4_include([regression/rhbz1596304.at]) - m4_include([regression/gh703.at]) -+m4_include([regression/ipset_netmask_allowed.at]) --- -2.27.0 - diff --git a/SOURCES/0022-test-offline-always-allow-ipset-tests.patch b/SOURCES/0022-test-offline-always-allow-ipset-tests.patch deleted file mode 100644 index 0077def..0000000 --- a/SOURCES/0022-test-offline-always-allow-ipset-tests.patch +++ /dev/null @@ -1,34 +0,0 @@ -From be0b7cac7e80d51cc976085f9575b0feb3f1fbe7 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Fri, 19 Feb 2021 10:27:18 -0500 -Subject: [PATCH 22/22] test(offline): always allow ipset tests - -(cherry picked from commit 50c713a8b82be5a3499a15f825cdceb373fe3698) -(cherry picked from commit f17e1937597455257a29ae848ea51c5e089c1077) ---- - src/tests/functions.at | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/src/tests/functions.at b/src/tests/functions.at -index 8632f49e442f..54afcf14585a 100644 ---- a/src/tests/functions.at -+++ b/src/tests/functions.at -@@ -519,6 +519,7 @@ m4_define([DBUS_SET], [ - ]) - - m4_define([CHECK_IPSET], [ -+ m4_ifdef([TESTING_FIREWALL_OFFLINE_CMD], [], [ - m4_if(nftables, FIREWALL_BACKEND, [ - dnl If our nft binary has buggy flush set, then skip the test - NS_CHECK([nft add table inet firewalld_check_ipset]) -@@ -537,6 +538,7 @@ m4_define([CHECK_IPSET], [ - - NS_CHECK([nft delete table inet firewalld_check_ipset]) - ]) -+ ]) - ]) - - m4_define([CHECK_IPSET_HASH_MAC], [ --- -2.27.0 - diff --git a/SOURCES/0023-fix-direct-rule-order-with-multiple-address-with-s-d.patch b/SOURCES/0023-fix-direct-rule-order-with-multiple-address-with-s-d.patch deleted file mode 100644 index 52b94ea..0000000 --- a/SOURCES/0023-fix-direct-rule-order-with-multiple-address-with-s-d.patch +++ /dev/null @@ -1,167 +0,0 @@ -From 44dff592c200f81d74b64ba1c729ec8ec3b8612e Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Tue, 13 Apr 2021 14:35:31 -0400 -Subject: [PATCH 23/30] fix(direct): rule order with multiple address with - -s/-d - -Fixes: rhbz 1940928 -Fixes: rhbz 1949552 -(cherry picked from commit 2be50d366b9ba073e5f86edcd0b412ff48c3fed1) -(cherry picked from commit a545183d6916169cd16648707b9f876ea0833955) ---- - src/firewall/core/fw_direct.py | 53 +++++++++++++++++++++++++++++----- - src/firewall/core/ipXtables.py | 32 -------------------- - 2 files changed, 46 insertions(+), 39 deletions(-) - -diff --git a/src/firewall/core/fw_direct.py b/src/firewall/core/fw_direct.py -index e53a72e3326a..76aeda9f19cb 100644 ---- a/src/firewall/core/fw_direct.py -+++ b/src/firewall/core/fw_direct.py -@@ -298,7 +298,7 @@ class FirewallDirect(object): - r.append((ipv, table, chain, priority, list(args))) - return r - -- def _register_rule(self, rule_id, chain_id, priority, enable): -+ def _register_rule(self, rule_id, chain_id, priority, enable, count): - if enable: - if chain_id not in self._rules: - self._rules[chain_id] = LastUpdatedOrderedDict() -@@ -307,14 +307,14 @@ class FirewallDirect(object): - self._rule_priority_positions[chain_id] = { } - - if priority in self._rule_priority_positions[chain_id]: -- self._rule_priority_positions[chain_id][priority] += 1 -+ self._rule_priority_positions[chain_id][priority] += count - else: -- self._rule_priority_positions[chain_id][priority] = 1 -+ self._rule_priority_positions[chain_id][priority] = count - else: - del self._rules[chain_id][rule_id] - if len(self._rules[chain_id]) == 0: - del self._rules[chain_id] -- self._rule_priority_positions[chain_id][priority] -= 1 -+ self._rule_priority_positions[chain_id][priority] -= count - - # DIRECT PASSTHROUGH (untracked) - -@@ -376,6 +376,34 @@ class FirewallDirect(object): - r.append(list(args)) - return r - -+ def split_value(self, rules, opts): -+ """Split values combined with commas for options in opts""" -+ -+ out_rules = [ ] -+ for rule in rules: -+ processed = False -+ for opt in opts: -+ try: -+ i = rule.index(opt) -+ except ValueError: -+ pass -+ else: -+ if len(rule) > i and "," in rule[i+1]: -+ # For all items in the comma separated list in index -+ # i of the rule, a new rule is created with a single -+ # item from this list -+ processed = True -+ items = rule[i+1].split(",") -+ for item in items: -+ _rule = rule[:] -+ _rule[i+1] = item -+ out_rules.append(_rule) -+ if not processed: -+ out_rules.append(rule) -+ -+ return out_rules -+ -+ - def _rule(self, enable, ipv, table, chain, priority, args, transaction): - self._check_ipv_table(ipv, table) - # Do not create zone chains if we're using nftables. Only allow direct -@@ -458,6 +486,7 @@ class FirewallDirect(object): - # has index 1. - - index = 1 -+ count = 0 - if chain_id in self._rule_priority_positions: - positions = sorted(self._rule_priority_positions[chain_id].keys()) - j = 0 -@@ -465,11 +494,21 @@ class FirewallDirect(object): - index += self._rule_priority_positions[chain_id][positions[j]] - j += 1 - -- transaction.add_rule(backend, backend.build_rule(enable, table, _chain, index, args)) -+ # split the direct rule in some cases as iptables-restore can't handle -+ # compound args. -+ # -+ args_list = [list(args)] -+ args_list = self.split_value(args_list, [ "-s", "--source" ]) -+ args_list = self.split_value(args_list, [ "-d", "--destination" ]) -+ -+ for _args in args_list: -+ transaction.add_rule(backend, backend.build_rule(enable, table, _chain, index, tuple(_args))) -+ index += 1 -+ count += 1 - -- self._register_rule(rule_id, chain_id, priority, enable) -+ self._register_rule(rule_id, chain_id, priority, enable, count) - transaction.add_fail(self._register_rule, -- rule_id, chain_id, priority, not enable) -+ rule_id, chain_id, priority, not enable, count) - - def _chain(self, add, ipv, table, chain, transaction): - self._check_ipv_table(ipv, table) -diff --git a/src/firewall/core/ipXtables.py b/src/firewall/core/ipXtables.py -index 968b75867849..818ce3f153d0 100644 ---- a/src/firewall/core/ipXtables.py -+++ b/src/firewall/core/ipXtables.py -@@ -200,36 +200,6 @@ class ip4tables(object): - " ".join(_args), ret)) - return ret - -- def split_value(self, rules, opts=None): -- """Split values combined with commas for options in opts""" -- -- if opts is None: -- return rules -- -- out_rules = [ ] -- for rule in rules: -- processed = False -- for opt in opts: -- try: -- i = rule.index(opt) -- except ValueError: -- pass -- else: -- if len(rule) > i and "," in rule[i+1]: -- # For all items in the comma separated list in index -- # i of the rule, a new rule is created with a single -- # item from this list -- processed = True -- items = rule[i+1].split(",") -- for item in items: -- _rule = rule[:] -- _rule[i+1] = item -- out_rules.append(_rule) -- if not processed: -- out_rules.append(rule) -- -- return out_rules -- - def _rule_replace(self, rule, pattern, replacement): - try: - i = rule.index(pattern) -@@ -472,8 +442,6 @@ class ip4tables(object): - - for table in table_rules: - rules = table_rules[table] -- rules = self.split_value(rules, [ "-s", "--source" ]) -- rules = self.split_value(rules, [ "-d", "--destination" ]) - - temp_file.write("*%s\n" % table) - for rule in rules: --- -2.27.0 - diff --git a/SOURCES/0024-test-direct-verify-rule-order-with-multiple-address-.patch b/SOURCES/0024-test-direct-verify-rule-order-with-multiple-address-.patch deleted file mode 100644 index a86b378..0000000 --- a/SOURCES/0024-test-direct-verify-rule-order-with-multiple-address-.patch +++ /dev/null @@ -1,86 +0,0 @@ -From ed0b0a7f967f33729e4ec7472b4229f0317fd92d Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Fri, 9 Apr 2021 13:34:31 -0400 -Subject: [PATCH 24/30] test(direct): verify rule order with multiple address - with -s/-d - -Coverage: rhbz 1940928 -Coverage: rhbz 1949552 -(cherry picked from commit 80c30dacc066af4d6d71d298b5e47625ecee5bdf) -(cherry picked from commit c1262441db90108eb8044053ae1b93f66f0c2839) ---- - src/tests/regression/regression.at | 1 + - src/tests/regression/rhbz1940928.at | 52 +++++++++++++++++++++++++++++ - 2 files changed, 53 insertions(+) - create mode 100644 src/tests/regression/rhbz1940928.at - -diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at -index a49bb3b756e7..8156ee608189 100644 ---- a/src/tests/regression/regression.at -+++ b/src/tests/regression/regression.at -@@ -39,3 +39,4 @@ m4_include([regression/rhbz1871298.at]) - m4_include([regression/rhbz1596304.at]) - m4_include([regression/gh703.at]) - m4_include([regression/ipset_netmask_allowed.at]) -+m4_include([regression/rhbz1940928.at]) -diff --git a/src/tests/regression/rhbz1940928.at b/src/tests/regression/rhbz1940928.at -new file mode 100644 -index 000000000000..0a4367080b5e ---- /dev/null -+++ b/src/tests/regression/rhbz1940928.at -@@ -0,0 +1,52 @@ -+FWD_START_TEST([direct -s/-d multiple addresses]) -+AT_KEYWORDS(direct rhbz1940928 rhbz1949552) -+CHECK_IPTABLES -+ -+dnl test triggers a limitation in iptables-restore -+dnl -+AT_CHECK([sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf]) -+FWD_RELOAD -+ -+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT], 0, [ignore], [ignore]) -+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore]) -+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore]) -+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 9 -j DROP], 0, [ignore], [ignore]) -+ -+IPTABLES_LIST_RULES_ALWAYS([filter], [m4_if(iptables, FIREWALL_BACKEND, [OUTPUT_direct], [OUTPUT])], 0, [dnl -+ ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED -+ ACCEPT tcp -- 0.0.0.0/0 10.0.0.0/8 -+ ACCEPT tcp -- 0.0.0.0/0 172.16.0.0/16 -+ ACCEPT tcp -- 0.0.0.0/0 192.168.0.0/24 -+ ACCEPT udp -- 0.0.0.0/0 10.0.0.0/8 -+ ACCEPT udp -- 0.0.0.0/0 172.16.0.0/16 -+ ACCEPT udp -- 0.0.0.0/0 192.168.0.0/24 -+ DROP all -- 0.0.0.0/0 0.0.0.0/0 -+]) -+ -+FWD_CHECK([--direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore]) -+ -+IPTABLES_LIST_RULES_ALWAYS([filter], [m4_if(iptables, FIREWALL_BACKEND, [OUTPUT_direct], [OUTPUT])], 0, [dnl -+ ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED -+ ACCEPT sctp -- 0.0.0.0/0 10.0.0.0/8 -+ ACCEPT sctp -- 0.0.0.0/0 172.16.0.0/16 -+ ACCEPT sctp -- 0.0.0.0/0 192.168.0.0/24 -+ ACCEPT tcp -- 0.0.0.0/0 10.0.0.0/8 -+ ACCEPT tcp -- 0.0.0.0/0 172.16.0.0/16 -+ ACCEPT tcp -- 0.0.0.0/0 192.168.0.0/24 -+ ACCEPT udp -- 0.0.0.0/0 10.0.0.0/8 -+ ACCEPT udp -- 0.0.0.0/0 172.16.0.0/16 -+ ACCEPT udp -- 0.0.0.0/0 192.168.0.0/24 -+ DROP all -- 0.0.0.0/0 0.0.0.0/0 -+]) -+ -+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT], 0, [ignore], [ignore]) -+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore]) -+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore]) -+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT], 0, [ignore], [ignore]) -+FWD_CHECK([--direct --remove-rule ipv4 filter OUTPUT 9 -j DROP], 0, [ignore], [ignore]) -+ -+ -+IPTABLES_LIST_RULES_ALWAYS([filter], [m4_if(iptables, FIREWALL_BACKEND, [OUTPUT_direct], [OUTPUT])], 0, [dnl -+]) -+ -+FWD_END_TEST --- -2.27.0 - diff --git a/SOURCES/0025-fix-ipset-fix-hash-net-net-functionality.patch b/SOURCES/0025-fix-ipset-fix-hash-net-net-functionality.patch deleted file mode 100644 index 2ad0bc0..0000000 --- a/SOURCES/0025-fix-ipset-fix-hash-net-net-functionality.patch +++ /dev/null @@ -1,31 +0,0 @@ -From 44442eace5a5a4330fb40d47cd9fb3c561d38c56 Mon Sep 17 00:00:00 2001 -From: Fabrizio D'Angelo -Date: Mon, 12 Apr 2021 13:56:00 -0400 -Subject: [PATCH 25/30] fix(ipset): fix hash:net,net functionality - -Fixes: rhbz 1936896 - -Signed-off-by: Fabrizio D'Angelo -(cherry picked from commit 36f3d50d729d3329ce99653d8227e3f52a02a43f) -(cherry picked from commit 3ea4779dc4a957f9c0eb795ab0b00e67d653b772) ---- - src/firewall/core/nftables.py | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/firewall/core/nftables.py b/src/firewall/core/nftables.py -index e6907421e111..e3ae988bbdab 100644 ---- a/src/firewall/core/nftables.py -+++ b/src/firewall/core/nftables.py -@@ -1742,8 +1742,8 @@ class nftables(object): - "hash:ip,mark" : [ipv_addr[ipv], "mark"], - - "hash:net" : ipv_addr[ipv], -+ "hash:net,net" : [ipv_addr[ipv], ipv_addr[ipv]], - "hash:net,port" : [ipv_addr[ipv], "inet_proto", "inet_service"], -- "hash:net,port,ip" : [ipv_addr[ipv], "inet_proto", "inet_service", ipv_addr[ipv]], - "hash:net,port,net" : [ipv_addr[ipv], "inet_proto", "inet_service", ipv_addr[ipv]], - "hash:net,iface" : [ipv_addr[ipv], "ifname"], - --- -2.27.0 - diff --git a/SOURCES/0026-test-ipset-add-test-to-verify-hash-net-net.patch b/SOURCES/0026-test-ipset-add-test-to-verify-hash-net-net.patch deleted file mode 100644 index 40c8dd7..0000000 --- a/SOURCES/0026-test-ipset-add-test-to-verify-hash-net-net.patch +++ /dev/null @@ -1,64 +0,0 @@ -From 6d19a0bdb26f0eeb08dfdd9957c184e90db8766e Mon Sep 17 00:00:00 2001 -From: Fabrizio D'Angelo -Date: Mon, 12 Apr 2021 14:05:36 -0400 -Subject: [PATCH 26/30] test(ipset): add test to verify hash:net,net - -Signed-off-by: Fabrizio D'Angelo -(cherry picked from commit f3bd1297f656217031957eee7cfb4b3ee5ef42f2) -(cherry picked from commit 690ad9abf26f8ec3486704553d891d7d2ce11a80) ---- - src/tests/regression/regression.at | 1 + - src/tests/regression/rhbz1936896.at | 32 +++++++++++++++++++++++++++++ - 2 files changed, 33 insertions(+) - create mode 100644 src/tests/regression/rhbz1936896.at - -diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at -index 8156ee608189..2a5ad9ef995a 100644 ---- a/src/tests/regression/regression.at -+++ b/src/tests/regression/regression.at -@@ -40,3 +40,4 @@ m4_include([regression/rhbz1596304.at]) - m4_include([regression/gh703.at]) - m4_include([regression/ipset_netmask_allowed.at]) - m4_include([regression/rhbz1940928.at]) -+m4_include([regression/rhbz1936896.at]) -diff --git a/src/tests/regression/rhbz1936896.at b/src/tests/regression/rhbz1936896.at -new file mode 100644 -index 000000000000..911db0bc448d ---- /dev/null -+++ b/src/tests/regression/rhbz1936896.at -@@ -0,0 +1,32 @@ -+FWD_START_TEST([ipset type hash:net,net]) -+AT_KEYWORDS(rhbz1936896) -+CHECK_IPSET -+ -+FWD_CHECK([-q --permanent --new-ipset testset --type hash:net,net]) -+FWD_CHECK([--permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24], 0, ignore) -+FWD_RELOAD -+FWD_CHECK([--permanent --info-ipset=testset | TRIM_WHITESPACE], 0, [m4_strip([dnl -+ testset -+ type: hash:net,net -+ options: -+ entries: 192.168.0.0/24,10.0.1.0/24 -+])]) -+ -+IPSET_LIST_SET([testset], 0, [dnl -+ Name: testset -+ Type: hash:net,net -+ Members: -+ 192.168.0.0/24,10.0.1.0/24 -+]) -+ -+NFT_LIST_SET([testset], 0, [dnl -+ table inet firewalld { -+ set testset { -+ type ipv4_addr . ipv4_addr -+ flags interval -+ elements = { 192.168.0.0/24 . 10.0.1.0/24 } -+ } -+ } -+]) -+ -+FWD_END_TEST --- -2.27.0 - diff --git a/SOURCES/0027-fix-nm-reload-only-consider-NM-connections-with-a-re.patch b/SOURCES/0027-fix-nm-reload-only-consider-NM-connections-with-a-re.patch deleted file mode 100644 index dd50e1b..0000000 --- a/SOURCES/0027-fix-nm-reload-only-consider-NM-connections-with-a-re.patch +++ /dev/null @@ -1,45 +0,0 @@ -From 1cbe39d4260c633da4b7110d6e2e7722b8454af4 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Tue, 27 Apr 2021 08:56:13 -0400 -Subject: [PATCH 27/30] fix(nm): reload: only consider NM connections with a - real interface - -Where real interface means linux interface capable of having an IP -address and does not exceed IFNAMSIZ. - -Fixes: rhbz 1928860 -(cherry picked from commit f18f1cc96503fbc5d42f30ecdc6f0da4c56aac4d) -(cherry picked from commit 7e9c4a5072ee3fd1aaf4162ef6ef1bf84b8a82eb) ---- - src/firewall/core/fw_nm.py | 8 ++++++-- - 1 file changed, 6 insertions(+), 2 deletions(-) - -diff --git a/src/firewall/core/fw_nm.py b/src/firewall/core/fw_nm.py -index 37282a1a7711..0e38dd47e927 100644 ---- a/src/firewall/core/fw_nm.py -+++ b/src/firewall/core/fw_nm.py -@@ -141,7 +141,9 @@ def nm_get_connections(connections, connections_name): - - connections_name[uuid] = name - for dev in devices: -- connections[dev.get_iface()] = uuid -+ ip_iface = dev.get_ip_iface() -+ if ip_iface: -+ connections[ip_iface] = uuid - - def nm_get_interfaces(): - """Get active interfaces from NM -@@ -169,7 +171,9 @@ def nm_get_interfaces(): - continue - - for dev in active_con.get_devices(): -- active_interfaces.append(dev.get_iface()) -+ ip_iface = dev.get_ip_iface() -+ if ip_iface: -+ active_interfaces.append(ip_iface) - - return active_interfaces - --- -2.27.0 - diff --git a/SOURCES/0028-test-nm-reload-only-consider-NM-connections-with-a-r.patch b/SOURCES/0028-test-nm-reload-only-consider-NM-connections-with-a-r.patch deleted file mode 100644 index 205968a..0000000 --- a/SOURCES/0028-test-nm-reload-only-consider-NM-connections-with-a-r.patch +++ /dev/null @@ -1,81 +0,0 @@ -From 1a2c50e5cf165a5392764ff435b7183a6d6610a7 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Tue, 27 Apr 2021 09:06:22 -0400 -Subject: [PATCH 28/30] test(nm): reload: only consider NM connections with a - real interface - -Coverage: rhbz 1928860 -(cherry picked from commit 7566d3dc5664955064b14314b3d3ef20bcebd6e4) -(cherry picked from commit e936e005898e18caa628b5b61d7589c2bbc461cb) ---- - src/tests/Makefile.am | 4 ++-- - src/tests/integration/networkmanager.at | 1 + - src/tests/integration/rhbz1928860.at | 26 +++++++++++++++++++++++++ - 3 files changed, 29 insertions(+), 2 deletions(-) - create mode 100644 src/tests/integration/rhbz1928860.at - -diff --git a/src/tests/Makefile.am b/src/tests/Makefile.am -index b7556b30ecc8..e936454faf6a 100644 ---- a/src/tests/Makefile.am -+++ b/src/tests/Makefile.am -@@ -71,7 +71,7 @@ check-container-fedora-rawhide-image: check-container-%-image: - iptables iptables-nft libtool libxml2 libxslt make nftables \ - python3-nftables python3-slip-dbus python3-gobject-base \ - diffutils procps-ng iproute which dbus-daemon \ -- NetworkManager" && \ -+ NetworkManager NetworkManager-ovs" && \ - echo "RUN alternatives --set ebtables /usr/sbin/ebtables-nft" && \ - echo "COPY . /tmp/firewalld"; \ - } | $(PODMAN) build -t firewalld-testsuite-$* -f - . ) -@@ -86,7 +86,7 @@ check-container-centos8-stream-image: check-container-%-image: - iptables iptables-ebtables nftables libtool libxml2 \ - libxslt make nftables python3-nftables python3-slip-dbus \ - python3-gobject-base diffutils procps-ng iproute which dbus-daemon \ -- NetworkManager" && \ -+ NetworkManager NetworkManager-ovs" && \ - echo "COPY . /tmp/firewalld"; \ - } | $(PODMAN) build -t firewalld-testsuite-$* -f - . ) - -diff --git a/src/tests/integration/networkmanager.at b/src/tests/integration/networkmanager.at -index 08cf6d28451a..0b20adce0462 100644 ---- a/src/tests/integration/networkmanager.at -+++ b/src/tests/integration/networkmanager.at -@@ -1,2 +1,3 @@ - AT_BANNER([NetworkManager (FIREWALL_BACKEND)]) - m4_include([integration/rhbz1773809.at]) -+m4_include([integration/rhbz1928860.at]) -diff --git a/src/tests/integration/rhbz1928860.at b/src/tests/integration/rhbz1928860.at -new file mode 100644 -index 000000000000..8ef2a1dcbd01 ---- /dev/null -+++ b/src/tests/integration/rhbz1928860.at -@@ -0,0 +1,26 @@ -+FWD_START_TEST([reload don't consider non IP capable interfaces]) -+AT_KEYWORDS(reload rhbz1928860) -+ -+START_NETWORKMANAGER -+ -+dnl OVS bridge and port -+NMCLI_CHECK([connection add type ovs-bridge conn.interface ovs-br con-name ovs-br], 0, [ignore]) -+NMCLI_CHECK([connection add type ovs-port conn.interface ovs-interface-port master ovs-br con-name ovs-interface-port], 0, [ignore]) -+echo NS_CMD([nmcli connection delete ovs-br]) >> ./cleanup -+echo NS_CMD([nmcli connection delete ovs-interface-port]) >> ./cleanup -+ -+dnl Up them -+NMCLI_CHECK([connection up ovs-br], 0, [ignore]) -+NMCLI_CHECK([connection up ovs-interface-port], 0, [ignore]) -+ -+dnl Omit the actual linux interface because it requires the OVS daemon to be -+dnl running. The bug is reproducible without it. -+dnl -+dnl NMCLI_CHECK([connection add type ovs-interface slave-type ovs-port conn.interface ovs-br master ovs-interface-port con-name ovs-interface ipv4.method disabled ipv6.method disabled], 0, [ignore]) -+dnl echo NS_CMD([nmcli connection delete ovs-interface]) >> ./cleanup -+dnl NMCLI_CHECK([connection up ovs-interface], 0, [ignore]) -+ -+dnl just need to verify reload -+FWD_RELOAD -+ -+FWD_END_TEST --- -2.27.0 - diff --git a/SOURCES/0029-docs-conf-note-that-IPv6_rpfilter-has-a-performance-.patch b/SOURCES/0029-docs-conf-note-that-IPv6_rpfilter-has-a-performance-.patch deleted file mode 100644 index faa8d8e..0000000 --- a/SOURCES/0029-docs-conf-note-that-IPv6_rpfilter-has-a-performance-.patch +++ /dev/null @@ -1,36 +0,0 @@ -From 6e97c635d2bfe9ef73f72aa165443cfcefc6c82c Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 17 May 2021 15:43:13 -0400 -Subject: [PATCH 29/30] docs(conf): note that IPv6_rpfilter has a performance - penalty - -Fixes: rhbz 1871860 -(cherry picked from commit aad59154e16f669bf85e9894e7e0e19061d370d4) -(cherry picked from commit 5391c26d3e730f283d1f00f7ac1869aeb2251837) ---- - doc/xml/firewalld.conf.xml | 9 +++++++++ - 1 file changed, 9 insertions(+) - -diff --git a/doc/xml/firewalld.conf.xml b/doc/xml/firewalld.conf.xml -index c21ef87813bc..0bf4c2d4d011 100644 ---- a/doc/xml/firewalld.conf.xml -+++ b/doc/xml/firewalld.conf.xml -@@ -114,6 +114,15 @@ - If a reply to the packet would be sent via the same interface that the packet arrived on, the packet will match and be accepted, otherwise dropped. - For IPv4 the rp_filter is controlled using sysctl. - -+ -+ Note: This feature has a performance -+ impact. In most cases the impact is not enough to cause a noticeable -+ difference. It requires route lookups and its execution occurs before -+ the established connections fast path. As such it can have a -+ significant performance impact if there is a lot of traffic. It's -+ enabled by default for security, but can be disabled if performance is -+ a concern. -+ - - - --- -2.27.0 - diff --git a/SOURCES/0030-improvement-conf-note-that-IPv6_rpfilter-has-a-perfo.patch b/SOURCES/0030-improvement-conf-note-that-IPv6_rpfilter-has-a-perfo.patch deleted file mode 100644 index 0dcb24d..0000000 --- a/SOURCES/0030-improvement-conf-note-that-IPv6_rpfilter-has-a-perfo.patch +++ /dev/null @@ -1,28 +0,0 @@ -From 60e4181ca9ac8dbd1acb6baf85b42b0666aa56b7 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 19 May 2021 12:52:52 -0400 -Subject: [PATCH 30/30] improvement(conf): note that IPv6_rpfilter has a - performance penalty - -(cherry picked from commit cf8e0df944322f1ad283946c64bf7f933c25340d) -(cherry picked from commit 1a8bb7e5dcee3bcd691219104427daf39ead1f82) ---- - config/firewalld.conf | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/config/firewalld.conf b/config/firewalld.conf -index f791b2358ab8..a0556c0bbf5b 100644 ---- a/config/firewalld.conf -+++ b/config/firewalld.conf -@@ -23,6 +23,8 @@ Lockdown=no - # packet would be sent via the same interface that the packet arrived on, the - # packet will match and be accepted, otherwise dropped. - # The rp_filter for IPv4 is controlled using sysctl. -+# Note: This feature has a performance impact. See man page FIREWALLD.CONF(5) -+# for details. - # Default: yes - IPv6_rpfilter=yes - --- -2.27.0 - diff --git a/SOURCES/0031-test-functions-FWD_GREP_LOG-allow-checking-error-cod.patch b/SOURCES/0031-test-functions-FWD_GREP_LOG-allow-checking-error-cod.patch deleted file mode 100644 index 787f4a4..0000000 --- a/SOURCES/0031-test-functions-FWD_GREP_LOG-allow-checking-error-cod.patch +++ /dev/null @@ -1,28 +0,0 @@ -From 8d8ec4530dea1a74254c6cc14ece4fa14f7f94fe Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Thu, 3 Jun 2021 12:00:06 -0400 -Subject: [PATCH 31/36] test(functions): FWD_GREP_LOG: allow checking error - code - -(cherry picked from commit 748bcaee9a1d1151cf0e4bc9229f7b46774332ae) -(cherry picked from commit 69c6a91ca507bdf0e18784ce06d3d872a1c2e5ab) ---- - src/tests/functions.at | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/tests/functions.at b/src/tests/functions.at -index 54afcf14585a..4b298644d7e4 100644 ---- a/src/tests/functions.at -+++ b/src/tests/functions.at -@@ -328,7 +328,7 @@ m4_define([FWD_CHECK], [ - ]) - - m4_define([FWD_GREP_LOG], [ -- AT_CHECK([grep "$1" ./firewalld.log], 0, [ignore], [ignore]) -+ AT_CHECK([grep "$1" ./firewalld.log], $2, [ignore], [ignore]) - ]) - - m4_define([TRIM], [[sed -e 's/^[ \t]*//' -e 's/[ \t]*$//']]) --- -2.27.0 - diff --git a/SOURCES/0032-test-functions-improve-checking-firewalld.log-for-er.patch b/SOURCES/0032-test-functions-improve-checking-firewalld.log-for-er.patch deleted file mode 100644 index c68de27..0000000 --- a/SOURCES/0032-test-functions-improve-checking-firewalld.log-for-er.patch +++ /dev/null @@ -1,41 +0,0 @@ -From fd61eebac7618b1f9051497904d4392ac9b6f53b Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Thu, 3 Jun 2021 12:12:03 -0400 -Subject: [PATCH 32/36] test(functions): improve checking firewalld.log for - errors - -Don't delete the errors/warnings from the log. Use sed/grep in a pipe -instead. - -(cherry picked from commit 23dc028083dbdbd291f022ab60bad0462e23d48e) -(cherry picked from commit 1bafb54763926f49f930038fb6ecd9ab3e05c796) ---- - src/tests/functions.at | 11 ++++------- - 1 file changed, 4 insertions(+), 7 deletions(-) - -diff --git a/src/tests/functions.at b/src/tests/functions.at -index 4b298644d7e4..03795bc3c132 100644 ---- a/src/tests/functions.at -+++ b/src/tests/functions.at -@@ -255,14 +255,11 @@ m4_define([FWD_START_TEST], [ - - m4_define([FWD_END_TEST], [ - m4_ifdef([TESTING_FIREWALL_OFFLINE_CMD], [], [ -- IF_HOST_SUPPORTS_IP6TABLES([], [ -- sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log -- ]) - if test x"$1" != x"ignore"; then -- if test -n "$1"; then -- sed -i $1 ./firewalld.log -- fi -- AT_FAIL_IF([[grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)' ./firewalld.log]]) -+ AT_FAIL_IF([cat ./firewalld.log | dnl -+ sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" | dnl -+ m4_ifnblank([$1], [sed $1 |]) dnl -+ [grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)']]) - fi - m4_undefine([CURRENT_DBUS_ADDRESS]) - m4_undefine([CURRENT_TEST_NS]) --- -2.27.0 - diff --git a/SOURCES/0033-fix-policy-warn-instead-of-error-for-overlapping-por.patch b/SOURCES/0033-fix-policy-warn-instead-of-error-for-overlapping-por.patch deleted file mode 100644 index 341cdf1..0000000 --- a/SOURCES/0033-fix-policy-warn-instead-of-error-for-overlapping-por.patch +++ /dev/null @@ -1,46 +0,0 @@ -From a79321b79b0543cff0c99702c1ab9eeaab8bfe06 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Thu, 3 Jun 2021 11:42:58 -0400 -Subject: [PATCH 33/36] fix(policy): warn instead of error for overlapping - ports - -Fixes: rhbz 1914935 -(cherry picked from commit b71e532bc21fb6a06345b5ecfeb60683c7a194e9) -(cherry picked from commit 66ca4b0fd9588d60d31998ad792f04962053aaab) ---- - src/firewall/core/fw_policy.py | 16 ++++++++++++++-- - 1 file changed, 14 insertions(+), 2 deletions(-) - -diff --git a/src/firewall/core/fw_policy.py b/src/firewall/core/fw_policy.py -index 3f5dab808ff0..79a52d8d97c0 100644 ---- a/src/firewall/core/fw_policy.py -+++ b/src/firewall/core/fw_policy.py -@@ -98,11 +98,23 @@ class FirewallPolicy(object): - for args in obj.services: - self.add_service(policy, args) - for args in obj.ports: -- self.add_port(policy, *args) -+ try: -+ self.add_port(policy, *args) -+ except FirewallError as error: -+ if error.code in [errors.ALREADY_ENABLED]: -+ log.warning(error) -+ else: -+ raise error - for args in obj.protocols: - self.add_protocol(policy, args) - for args in obj.source_ports: -- self.add_source_port(policy, *args) -+ try: -+ self.add_source_port(policy, *args) -+ except FirewallError as error: -+ if error.code in [errors.ALREADY_ENABLED]: -+ log.warning(error) -+ else: -+ raise error - for args in obj.rules: - self.add_rule(policy, args) - if obj.masquerade: --- -2.27.0 - diff --git a/SOURCES/0034-test-zone-verify-overlapping-ports-don-t-halt-zone-l.patch b/SOURCES/0034-test-zone-verify-overlapping-ports-don-t-halt-zone-l.patch deleted file mode 100644 index 83c1d99..0000000 --- a/SOURCES/0034-test-zone-verify-overlapping-ports-don-t-halt-zone-l.patch +++ /dev/null @@ -1,99 +0,0 @@ -From 7c1e62b4933f2b110dcedc411b4381c00abe799f Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Thu, 3 Jun 2021 11:27:11 -0400 -Subject: [PATCH 34/36] test(zone): verify overlapping ports don't halt zone - loading - -We can warn about the overlapping ports, but don't completely error out. - -Coverage: rhbz 1914935 -(cherry picked from commit 012a87a343673c7699f48fa6af973c890be08671) -(cherry picked from commit 50e4c979283eee83bf0c707184cd0ca9bf112e85) ---- - src/tests/regression/regression.at | 1 + - src/tests/regression/rhbz1914935.at | 64 +++++++++++++++++++++++++++++ - 2 files changed, 65 insertions(+) - create mode 100644 src/tests/regression/rhbz1914935.at - -diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at -index 2a5ad9ef995a..aadd948a459f 100644 ---- a/src/tests/regression/regression.at -+++ b/src/tests/regression/regression.at -@@ -41,3 +41,4 @@ m4_include([regression/gh703.at]) - m4_include([regression/ipset_netmask_allowed.at]) - m4_include([regression/rhbz1940928.at]) - m4_include([regression/rhbz1936896.at]) -+m4_include([regression/rhbz1914935.at]) -diff --git a/src/tests/regression/rhbz1914935.at b/src/tests/regression/rhbz1914935.at -new file mode 100644 -index 000000000000..5b110ea4cf4d ---- /dev/null -+++ b/src/tests/regression/rhbz1914935.at -@@ -0,0 +1,64 @@ -+FWD_START_TEST([zone overlapping ports]) -+AT_KEYWORDS(zone port rhbz1914935) -+ -+AT_CHECK([mkdir -p ./zones]) -+ -+AT_DATA([./zones/foobar.xml], [dnl -+ -+ -+ -+ -+ -+ -+]) -+FWD_RELOAD -+FWD_GREP_LOG([WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar']) -+FWD_GREP_LOG([WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar']) -+FWD_CHECK([--zone foobar --list-ports], 0, [dnl -+1024-65535/tcp -+]) -+ -+AT_DATA([./zones/foobar.xml], [dnl -+ -+ -+ -+ -+ -+ -+]) -+FWD_RELOAD -+FWD_GREP_LOG([WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar']) -+FWD_GREP_LOG([WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar']) -+FWD_CHECK([--zone foobar --list-source-ports], 0, [dnl -+1024-65535/tcp -+]) -+ -+dnl this one partially overlaps so it should not throw a warning. -+AT_DATA([./zones/foobar.xml], [dnl -+ -+ -+ -+ -+ -+]) -+FWD_RELOAD -+FWD_GREP_LOG([WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'], 1) -+FWD_CHECK([--zone foobar --list-ports], 0, [dnl -+1024-2500/tcp -+]) -+ -+dnl this one partially overlaps so it should not throw a warning. -+AT_DATA([./zones/foobar.xml], [dnl -+ -+ -+ -+ -+ -+]) -+FWD_RELOAD -+FWD_GREP_LOG([WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'], 1) -+FWD_CHECK([--zone foobar --list-source-ports], 0, [dnl -+1024-2500/tcp -+]) -+ -+FWD_END_TEST([-e '/WARNING: ALREADY_ENABLED:/d']) --- -2.27.0 - diff --git a/SOURCES/0037-docs-firewall-cmd-client-conntrack-helpers-must-use-.patch b/SOURCES/0037-docs-firewall-cmd-client-conntrack-helpers-must-use-.patch deleted file mode 100644 index 6b2607d..0000000 --- a/SOURCES/0037-docs-firewall-cmd-client-conntrack-helpers-must-use-.patch +++ /dev/null @@ -1,74 +0,0 @@ -From 78060c945be591b4fe8a1b0d3f206585d3948676 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Fri, 2 Jul 2021 11:19:18 -0400 -Subject: [PATCH 37/50] docs(firewall-*cmd): client conntrack helpers must use - a policy - -Fixes: rhbz 1899933 -Fixes: rhbz 1975484 -(cherry picked from commit adb4ccd88e6c1fd460c9c674d89fdf89299c3970) -(cherry picked from commit 8cd0da7032080ada6b80b7f97faec6a30a8d45f5) ---- - doc/xml/firewall-cmd.xml.in | 17 +++++++++++++++++ - doc/xml/firewall-offline-cmd.xml | 17 +++++++++++++++++ - 2 files changed, 34 insertions(+) - -diff --git a/doc/xml/firewall-cmd.xml.in b/doc/xml/firewall-cmd.xml.in -index 691117f3dbff..8cd67e388ef5 100644 ---- a/doc/xml/firewall-cmd.xml.in -+++ b/doc/xml/firewall-cmd.xml.in -@@ -634,6 +634,23 @@ - - The option is not combinable with the option. - -+ -+ Note: Some services define connection tracking helpers. -+ Helpers that may operate in client mode (e.g. tftp) must be added to an -+ outbound policy instead of a zone to take effect for clients. Otherwise -+ the helper will not be applied to the outbound traffic. The related -+ traffic, as defined by the connection tracking helper, on the return -+ path (ingress) will be allowed by the stateful firewall rules. -+ -+ -+ An example of an outbound policy for connection tracking helpers: -+ -+# firewall-cmd --permanent --new-policy clientConntrack -+# firewall-cmd --permanent --policy clientConntrack --add-ingress-zone HOST -+# firewall-cmd --permanent --policy clientConntrack --add-egress-zone ANY -+# firewall-cmd --permanent --policy clientConntrack --add-service tftp -+ -+ - - - -diff --git a/doc/xml/firewall-offline-cmd.xml b/doc/xml/firewall-offline-cmd.xml -index 92ec55be4623..8e2dd7989956 100644 ---- a/doc/xml/firewall-offline-cmd.xml -+++ b/doc/xml/firewall-offline-cmd.xml -@@ -722,6 +722,23 @@ - - The service is one of the firewalld provided services. To get a list of the supported services, use firewall-cmd --get-services. - -+ -+ Note: Some services define connection tracking helpers. -+ Helpers that may operate in client mode (e.g. tftp) must be added to an -+ outbound policy instead of a zone to take effect for clients. Otherwise -+ the helper will not be applied to the outbound traffic. The related -+ traffic, as defined by the connection tracking helper, on the return -+ path (ingress) will be allowed by the stateful firewall rules. -+ -+ -+ An example of an outbound policy for connection tracking helpers: -+ -+# firewall-cmd --new-policy clientConntrack -+# firewall-cmd --policy clientConntrack --add-ingress-zone HOST -+# firewall-cmd --policy clientConntrack --add-egress-zone ANY -+# firewall-cmd --policy clientConntrack --add-service tftp -+ -+ - - - --- -2.27.0 - diff --git a/SOURCES/0038-fix-nftables-do-not-log-icmp-block-if-inversion.patch b/SOURCES/0038-fix-nftables-do-not-log-icmp-block-if-inversion.patch deleted file mode 100644 index f6c5b0b..0000000 --- a/SOURCES/0038-fix-nftables-do-not-log-icmp-block-if-inversion.patch +++ /dev/null @@ -1,29 +0,0 @@ -From de28755c4e14224f6303c864327fffe7d2639268 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 13 Sep 2021 15:45:53 -0400 -Subject: [PATCH 38/50] fix(nftables): do not log icmp block if inversion - -Fixes: #696 -Fixes: rhbz1945833 -(cherry picked from commit 50a5ed2d0fa6169c6780488dae931a3b4fce47ab) -(cherry picked from commit a451b033200b289c6fac823f7dce23c37a38a3d1) ---- - src/firewall/core/nftables.py | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/firewall/core/nftables.py b/src/firewall/core/nftables.py -index e3ae988bbdab..29a9a2492032 100644 ---- a/src/firewall/core/nftables.py -+++ b/src/firewall/core/nftables.py -@@ -1601,7 +1601,7 @@ class nftables(object): - rule.update(self._rich_rule_priority_fragment(rich_rule)) - rules.append({add_del: {"rule": rule}}) - else: -- if self._fw.get_log_denied() != "off" and self._fw.policy.query_icmp_block_inversion(policy): -+ if self._fw.get_log_denied() != "off" and not self._fw.policy.query_icmp_block_inversion(policy): - rules.append({add_del: {"rule": {"family": "inet", - "table": TABLE_NAME, - "chain": final_chain, --- -2.27.0 - diff --git a/SOURCES/0039-test-icmp-don-t-log-blocked-if-ICMP-inversion.patch b/SOURCES/0039-test-icmp-don-t-log-blocked-if-ICMP-inversion.patch deleted file mode 100644 index bcc8fe3..0000000 --- a/SOURCES/0039-test-icmp-don-t-log-blocked-if-ICMP-inversion.patch +++ /dev/null @@ -1,135 +0,0 @@ -From b2075eb46f1798ba897ca443ea14872b17267d69 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 13 Sep 2021 14:54:42 -0400 -Subject: [PATCH 39/50] test(icmp): don't log blocked if ICMP inversion - -Coverage: #696 -Coverage: rhbz1945833 -(cherry picked from commit b7d9a74731f9c5a1a6faf0f2959adcc315d2ca16) -(cherry picked from commit d45c614967cec6a608c93c1e8531089d7b1150bb) ---- - src/tests/regression/gh696.at | 102 +++++++++++++++++++++++++++++ - src/tests/regression/regression.at | 1 + - 2 files changed, 103 insertions(+) - create mode 100644 src/tests/regression/gh696.at - -diff --git a/src/tests/regression/gh696.at b/src/tests/regression/gh696.at -new file mode 100644 -index 000000000000..19b8d485a0a5 ---- /dev/null -+++ b/src/tests/regression/gh696.at -@@ -0,0 +1,102 @@ -+FWD_START_TEST([icmp-block-inversion no log blocked]) -+AT_KEYWORDS(icmp gh696 rhbz1945833) -+ -+FWD_CHECK([--permanent --zone public --remove-icmp-block-inversion], 0, [ignore], [ignore]) -+FWD_CHECK([--permanent --zone public --add-icmp-block echo-request], 0, [ignore]) -+FWD_RELOAD() -+ -+NFT_LIST_RULES([inet], [filter_IN_public_deny], 0, [dnl -+ table inet firewalld { -+ chain filter_IN_public_deny { -+ icmp type echo-request reject with icmpx type admin-prohibited -+ icmpv6 type echo-request reject with icmpx type admin-prohibited -+ } -+ } -+]) -+ -+IPTABLES_LIST_RULES([filter], [IN_public_deny], 0, [dnl -+ REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited -+]) -+IP6TABLES_LIST_RULES([filter], [IN_public_deny], 0, [dnl -+ REJECT icmpv6 ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited -+]) -+ -+dnl since inversion is disabled we should get logs when the ICMP is blocked. -+FWD_CHECK([--set-log-denied all], 0, [ignore]) -+ -+NFT_LIST_RULES([inet], [filter_IN_public_deny], 0, [dnl -+ table inet firewalld { -+ chain filter_IN_public_deny { -+ icmp type echo-request log prefix ""filter_zone_public_HOST_ICMP_BLOCK: "" -+ icmp type echo-request reject with icmpx type admin-prohibited -+ icmpv6 type echo-request log prefix ""filter_zone_public_HOST_ICMP_BLOCK: "" -+ icmpv6 type echo-request reject with icmpx type admin-prohibited -+ } -+ } -+]) -+ -+IPTABLES_LIST_RULES([filter], [IN_public_deny], 0, [dnl -+ LOG icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 LOG flags 0 level 4 prefix "zone_public_HOST_ICMP_BLOCK: " -+ REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited -+]) -+IP6TABLES_LIST_RULES([filter], [IN_public_deny], 0, [dnl -+ LOG icmpv6 ::/0 ::/0 ipv6-icmptype 128 LOG flags 0 level 4 prefix "zone_public_HOST_ICMP_BLOCK: " -+ REJECT icmpv6 ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited -+]) -+ -+dnl ######################################## -+dnl ######################################## -+dnl Same as above, but with icmp block inversion. -+dnl ######################################## -+dnl ######################################## -+ -+FWD_CHECK([--permanent --zone public --add-icmp-block-inversion], 0, [ignore]) -+FWD_CHECK([--set-log-denied off], 0, [ignore]) -+ -+NFT_LIST_RULES([inet], [filter_IN_public_allow], 0, [dnl -+ table inet firewalld { -+ chain filter_IN_public_allow { -+ tcp dport 22 ct state new,untracked accept -+ ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept -+ icmp type echo-request accept -+ icmpv6 type echo-request accept -+ } -+ } -+]) -+ -+IPTABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl -+ ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED -+ ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 -+]) -+IP6TABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl -+ ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED -+ ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED -+ ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 128 -+]) -+ -+dnl since inversion is enabled, it should be the same whether set-log-denied is -+dnl enabled or not. -+FWD_CHECK([--set-log-denied all], 0, [ignore]) -+ -+NFT_LIST_RULES([inet], [filter_IN_public_allow], 0, [dnl -+ table inet firewalld { -+ chain filter_IN_public_allow { -+ tcp dport 22 ct state new,untracked accept -+ ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept -+ icmp type echo-request accept -+ icmpv6 type echo-request accept -+ } -+ } -+]) -+ -+IPTABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl -+ ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED -+ ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 -+]) -+IP6TABLES_LIST_RULES([filter], [IN_public_allow], 0, [dnl -+ ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED -+ ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED -+ ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 128 -+]) -+ -+FWD_END_TEST([-d '/WARNING: NOT_ENABLED: icmp-block-inversion/d']) -diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at -index aadd948a459f..ba41a56b29b5 100644 ---- a/src/tests/regression/regression.at -+++ b/src/tests/regression/regression.at -@@ -42,3 +42,4 @@ m4_include([regression/ipset_netmask_allowed.at]) - m4_include([regression/rhbz1940928.at]) - m4_include([regression/rhbz1936896.at]) - m4_include([regression/rhbz1914935.at]) -+m4_include([regression/gh696.at]) --- -2.27.0 - diff --git a/SOURCES/0040-fix-nftables-rich-source-address-with-netmask.patch b/SOURCES/0040-fix-nftables-rich-source-address-with-netmask.patch deleted file mode 100644 index 740dcf0..0000000 --- a/SOURCES/0040-fix-nftables-rich-source-address-with-netmask.patch +++ /dev/null @@ -1,38 +0,0 @@ -From 12fd98893d190df9581d04155fa9207d2adb5573 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 15 Sep 2021 14:12:37 -0400 -Subject: [PATCH 40/50] fix(nftables): rich: source address with netmask - -Fixes: rhbz1917766 -(cherry picked from commit 3809fef17dc779052a3f050041fe90e3599f35be) -(cherry picked from commit 32d5eb8d94a2b39a4dda10fec351ad6fbab7d486) ---- - src/firewall/core/nftables.py | 5 +++-- - 1 file changed, 3 insertions(+), 2 deletions(-) - -diff --git a/src/firewall/core/nftables.py b/src/firewall/core/nftables.py -index 29a9a2492032..059cd8869dbb 100644 ---- a/src/firewall/core/nftables.py -+++ b/src/firewall/core/nftables.py -@@ -22,6 +22,7 @@ from __future__ import absolute_import - - import copy - import json -+import ipaddress - - from firewall.core.logger import log - from firewall.functions import check_mac, getPortRange, normalizeIP6, \ -@@ -1213,8 +1214,8 @@ class nftables(object): - family = "ip" - elif check_address("ipv4", address): - family = "ip" -- addr_len = address.split("/") -- address = {"prefix": {"addr": addr_len[0], "len": int(addr_len[1])}} -+ normalized_address = ipaddress.IPv4Network(address, strict=False) -+ address = {"prefix": {"addr": normalized_address.network_address.compressed, "len": normalized_address.prefixlen}} - elif check_single_address("ipv6", address): - family = "ip6" - address = normalizeIP6(address) --- -2.27.0 - diff --git a/SOURCES/0041-test-rich-source-address-with-netmask.patch b/SOURCES/0041-test-rich-source-address-with-netmask.patch deleted file mode 100644 index 51f4366..0000000 --- a/SOURCES/0041-test-rich-source-address-with-netmask.patch +++ /dev/null @@ -1,56 +0,0 @@ -From 0be3d6ba5d6a1cb17c965a5454cc156fbb2ac867 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 15 Sep 2021 13:47:01 -0400 -Subject: [PATCH 41/50] test(rich): source address with netmask - -Coverage: rhbz1917766 -(cherry picked from commit 9e9f94061b129e22e8c6fc2f8985d782bfe09689) -(cherry picked from commit 498c6b221ebbca09401ae5f98498c6a148ae602f) ---- - src/tests/regression/regression.at | 1 + - src/tests/regression/rhbz1917766.at | 24 ++++++++++++++++++++++++ - 2 files changed, 25 insertions(+) - create mode 100644 src/tests/regression/rhbz1917766.at - -diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at -index ba41a56b29b5..f9d42d6e2765 100644 ---- a/src/tests/regression/regression.at -+++ b/src/tests/regression/regression.at -@@ -43,3 +43,4 @@ m4_include([regression/rhbz1940928.at]) - m4_include([regression/rhbz1936896.at]) - m4_include([regression/rhbz1914935.at]) - m4_include([regression/gh696.at]) -+m4_include([regression/rhbz1917766.at]) -diff --git a/src/tests/regression/rhbz1917766.at b/src/tests/regression/rhbz1917766.at -new file mode 100644 -index 000000000000..b25d0a2f9740 ---- /dev/null -+++ b/src/tests/regression/rhbz1917766.at -@@ -0,0 +1,24 @@ -+FWD_START_TEST([rich rule source with netmask]) -+AT_KEYWORDS(rich rhbz1917766) -+ -+dnl Note: IPv6 only supports CIDR notation. It does not support address/netmask -+dnl notation. -+ -+FWD_CHECK([ --zone public --add-rich-rule='rule family=ipv4 source address="192.168.1.0/255.255.255.0" accept'], 0, [ignore]) -+FWD_CHECK([--permanent --zone public --add-rich-rule='rule family=ipv4 source address="192.168.1.0/255.255.255.0" accept'], 0, [ignore]) -+ -+AT_DATA([./zones/foobar.xml], [dnl -+ -+ -+ foobar -+ foobar -+ -+ -+ -+ -+ -+]) -+FWD_RELOAD() -+FWD_CHECK([--zone foobar --add-interface foobar0], 0, [ignore]) -+ -+FWD_END_TEST() --- -2.27.0 - diff --git a/SOURCES/0042-test-zone-source-with-netmask.patch b/SOURCES/0042-test-zone-source-with-netmask.patch deleted file mode 100644 index b63d66e..0000000 --- a/SOURCES/0042-test-zone-source-with-netmask.patch +++ /dev/null @@ -1,26 +0,0 @@ -From 8ef0683614704039f1dc7bfe22ace159f9961f15 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 15 Sep 2021 14:38:28 -0400 -Subject: [PATCH 42/50] test(zone): source with netmask - -(cherry picked from commit e635bdffa630c827ff0ed2fc2bb201d560631be0) -(cherry picked from commit 818f39d4c3b029b12e744505cfe35b0b47bed7db) ---- - src/tests/cli/firewall-cmd.at | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/src/tests/cli/firewall-cmd.at b/src/tests/cli/firewall-cmd.at -index 450737776a9f..f36f634853fa 100644 ---- a/src/tests/cli/firewall-cmd.at -+++ b/src/tests/cli/firewall-cmd.at -@@ -214,6 +214,7 @@ sources: $1 - - check_zone_source([1.2.3.4]) - check_zone_source([192.168.1.0/24]) -+ check_zone_source([192.168.1.1/255.255.255.0]) - IF_HOST_SUPPORTS_IPV6_RULES([ - check_zone_source([3ffe:501:ffff::/64]) - check_zone_source([dead:beef::babe]) --- -2.27.0 - diff --git a/SOURCES/0043-fix-fw_config-zone-on-rename-remove-then-add.patch b/SOURCES/0043-fix-fw_config-zone-on-rename-remove-then-add.patch deleted file mode 100644 index 2c597fd..0000000 --- a/SOURCES/0043-fix-fw_config-zone-on-rename-remove-then-add.patch +++ /dev/null @@ -1,43 +0,0 @@ -From b2c9302e8a4ad1ab7535a557b2f9c9aa49b49629 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 27 Oct 2021 11:09:39 -0400 -Subject: [PATCH 43/50] fix(fw_config): zone: on rename remove then add - -Remove the old object before creating the new one. This avoids issues -such as conflicting configuration in the objects that check_config() may -trip over. - -(cherry picked from commit 3aec1dfe449d0bcb52884341770e4def0de27f56) -(cherry picked from commit a58b45d8ee3221309ec0c6f919c266b5cfc6f89a) ---- - src/firewall/core/fw_config.py | 11 +++++++---- - 1 file changed, 7 insertions(+), 4 deletions(-) - -diff --git a/src/firewall/core/fw_config.py b/src/firewall/core/fw_config.py -index 148ce1b4e32c..a97d0b23a6ac 100644 ---- a/src/firewall/core/fw_config.py -+++ b/src/firewall/core/fw_config.py -@@ -984,13 +984,16 @@ class FirewallConfig(object): - - def rename_zone(self, obj, name): - self.check_builtin_zone(obj) -- new_zone = self._copy_zone(obj, name) -+ obj_conf = obj.export_config_dict() - self._remove_zone(obj) -+ try: -+ new_zone = self.new_zone_dict(name, obj_conf) -+ except: -+ # re-add original if rename failed -+ self.new_zone_dict(obj.name, obj_conf) -+ raise - return new_zone - -- def _copy_zone(self, obj, name): -- return self.new_zone_dict(name, obj.export_config_dict()) -- - # policy objects - - def get_policy_objects(self): --- -2.27.0 - diff --git a/SOURCES/0044-fix-io-functions-check_config-against-on-disk-conf.patch b/SOURCES/0044-fix-io-functions-check_config-against-on-disk-conf.patch deleted file mode 100644 index 39bce67..0000000 --- a/SOURCES/0044-fix-io-functions-check_config-against-on-disk-conf.patch +++ /dev/null @@ -1,98 +0,0 @@ -From 0e28840f5c3362d032f2f805cbbe6fbbaa217437 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 27 Oct 2021 13:58:27 -0400 -Subject: [PATCH 44/50] fix(io/functions): check_config against on disk conf - -Before this change the runtime FirewallConfig() instance was used. This -caused some permanent configuration issues to not be caught due to -comparing against the runtime instances of all objects. - -For example, two zones in permanent configuration may use the same -interface (which is not valid), but if the runtime configuration does -not have have these interface assignments then check_config() won't -catch the issue since it compares against the runtime configuration. - -Fix is to build a temporary FirewallConfig() instance for all the -on-disk/permanent configuration. - -(cherry picked from commit 35d4facc8962cd1b66bc245fe03f658d491e1061) -(cherry picked from commit 55a799e872dc88b1341a6bc38af33e77dfedb72f) ---- - src/firewall/core/io/functions.py | 47 ++++++++++++++++++++++--------- - 1 file changed, 34 insertions(+), 13 deletions(-) - -diff --git a/src/firewall/core/io/functions.py b/src/firewall/core/io/functions.py -index 0c7b1886426c..35a7eaf8dec8 100644 ---- a/src/firewall/core/io/functions.py -+++ b/src/firewall/core/io/functions.py -@@ -24,6 +24,7 @@ import os - from firewall import config - from firewall.errors import FirewallError - -+from firewall.core.fw_config import FirewallConfig - from firewall.core.io.zone import zone_reader - from firewall.core.io.service import service_reader - from firewall.core.io.ipset import ipset_reader -@@ -34,26 +35,46 @@ from firewall.core.io.direct import Direct - from firewall.core.io.lockdown_whitelist import LockdownWhitelist - from firewall.core.io.firewalld_conf import firewalld_conf - --def check_config(fw=None): -+def check_config(fw): -+ fw_config = FirewallConfig(fw) - readers = { -- "ipset" : (ipset_reader, [config.FIREWALLD_IPSETS, config.ETC_FIREWALLD_IPSETS]), -- "helper" : (helper_reader, [config.FIREWALLD_HELPERS, config.ETC_FIREWALLD_HELPERS]), -- "icmptype" : (icmptype_reader, [config.FIREWALLD_ICMPTYPES, config.ETC_FIREWALLD_ICMPTYPES]), -- "service" : (service_reader, [config.FIREWALLD_SERVICES, config.ETC_FIREWALLD_SERVICES]), -- "zone" : (zone_reader, [config.FIREWALLD_ZONES, config.ETC_FIREWALLD_ZONES]), -- "policy" : (policy_reader, [config.FIREWALLD_POLICIES, config.ETC_FIREWALLD_POLICIES]), -+ "ipset": {"reader": ipset_reader, -+ "add": fw_config.add_ipset, -+ "dirs": [config.FIREWALLD_IPSETS, config.ETC_FIREWALLD_IPSETS], -+ }, -+ "helper": {"reader": helper_reader, -+ "add": fw_config.add_helper, -+ "dirs": [config.FIREWALLD_HELPERS, config.ETC_FIREWALLD_HELPERS], -+ }, -+ "icmptype": {"reader": icmptype_reader, -+ "add": fw_config.add_icmptype, -+ "dirs": [config.FIREWALLD_ICMPTYPES, config.ETC_FIREWALLD_ICMPTYPES], -+ }, -+ "service": {"reader": service_reader, -+ "add": fw_config.add_service, -+ "dirs": [config.FIREWALLD_SERVICES, config.ETC_FIREWALLD_SERVICES], -+ }, -+ "zone": {"reader": zone_reader, -+ "add": fw_config.add_zone, -+ "dirs": [config.FIREWALLD_ZONES, config.ETC_FIREWALLD_ZONES], -+ }, -+ "policy": {"reader": policy_reader, -+ "add": fw_config.add_policy_object, -+ "dirs": [config.FIREWALLD_POLICIES, config.ETC_FIREWALLD_POLICIES], -+ }, - } - for reader in readers.keys(): -- for dir in readers[reader][1]: -- if not os.path.isdir(dir): -+ for _dir in readers[reader]["dirs"]: -+ if not os.path.isdir(_dir): - continue -- for file in sorted(os.listdir(dir)): -+ for file in sorted(os.listdir(_dir)): - if file.endswith(".xml"): - try: -- obj = readers[reader][0](file, dir) -- if fw and reader in ["zone", "policy"]: -- obj.fw_config = fw.config -+ obj = readers[reader]["reader"](file, _dir) -+ if reader in ["zone", "policy"]: -+ obj.fw_config = fw_config - obj.check_config(obj.export_config()) -+ readers[reader]["add"](obj) - except FirewallError as error: - raise FirewallError(error.code, "'%s': %s" % (file, error.msg)) - except Exception as msg: --- -2.27.0 - diff --git a/SOURCES/0045-fix-zone-detect-same-source-interface-in-zones.patch b/SOURCES/0045-fix-zone-detect-same-source-interface-in-zones.patch deleted file mode 100644 index a5542f3..0000000 --- a/SOURCES/0045-fix-zone-detect-same-source-interface-in-zones.patch +++ /dev/null @@ -1,46 +0,0 @@ -From 8311259a6e2a6ac475c3d8c9a2df099469bf8277 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Wed, 27 Oct 2021 10:13:59 -0400 -Subject: [PATCH 45/50] fix(zone): detect same source/interface in zones - -Fixes: rhbz2014383 -(cherry picked from commit 4b721abb087a529596722a045a63a65af2e0566a) -(cherry picked from commit 081fcfe7b255b2e0f91c4a3dc55539e4cfd4b7d1) ---- - src/firewall/core/io/zone.py | 15 +++++++++++++++ - 1 file changed, 15 insertions(+) - -diff --git a/src/firewall/core/io/zone.py b/src/firewall/core/io/zone.py -index 3aea94a13155..4291ec9cba00 100644 ---- a/src/firewall/core/io/zone.py -+++ b/src/firewall/core/io/zone.py -@@ -193,11 +193,26 @@ class Zone(IO_Object): - for interface in config: - if not checkInterface(interface): - raise FirewallError(errors.INVALID_INTERFACE, interface) -+ if self.fw_config: -+ for zone in self.fw_config.get_zones(): -+ if zone == self.name: -+ continue -+ if interface in self.fw_config.get_zone(zone).interfaces: -+ raise FirewallError(errors.INVALID_INTERFACE, -+ "interface '{}' already bound to zone '{}'".format(interface, zone)) - elif item == "sources": - for source in config: - if not checkIPnMask(source) and not checkIP6nMask(source) and \ - not check_mac(source) and not source.startswith("ipset:"): - raise FirewallError(errors.INVALID_ADDR, source) -+ if self.fw_config: -+ for zone in self.fw_config.get_zones(): -+ if zone == self.name: -+ continue -+ if source in self.fw_config.get_zone(zone).sources: -+ raise FirewallError(errors.INVALID_ADDR, -+ "source '{}' already bound to zone '{}'".format(source, zone)) -+ - - def check_name(self, name): - super(Zone, self).check_name(name) --- -2.27.0 - diff --git a/SOURCES/0046-test-zone-detect-same-source-interface-in-zones.patch b/SOURCES/0046-test-zone-detect-same-source-interface-in-zones.patch deleted file mode 100644 index 3ee2c37..0000000 --- a/SOURCES/0046-test-zone-detect-same-source-interface-in-zones.patch +++ /dev/null @@ -1,88 +0,0 @@ -From 63754e688baba56c7e625b53d39aa7380a754094 Mon Sep 17 00:00:00 2001 -From: Eric Garver -Date: Mon, 25 Oct 2021 09:35:51 -0400 -Subject: [PATCH 46/50] test(zone): detect same source/interface in zones - -Coverage: rhbz2014383 -(cherry picked from commit 6f68d295ac5edcdb10c062e2fba7b810ce2db58c) -(cherry picked from commit a15069d5542c2af391266f2da5f4137766d11a57) ---- - src/tests/regression/regression.at | 1 + - src/tests/regression/rhbz2014383.at | 56 +++++++++++++++++++++++++++++ - 2 files changed, 57 insertions(+) - create mode 100644 src/tests/regression/rhbz2014383.at - -diff --git a/src/tests/regression/regression.at b/src/tests/regression/regression.at -index f9d42d6e2765..a20b913fbe59 100644 ---- a/src/tests/regression/regression.at -+++ b/src/tests/regression/regression.at -@@ -44,3 +44,4 @@ m4_include([regression/rhbz1936896.at]) - m4_include([regression/rhbz1914935.at]) - m4_include([regression/gh696.at]) - m4_include([regression/rhbz1917766.at]) -+m4_include([regression/rhbz2014383.at]) -diff --git a/src/tests/regression/rhbz2014383.at b/src/tests/regression/rhbz2014383.at -new file mode 100644 -index 000000000000..f2ef766dc1b2 ---- /dev/null -+++ b/src/tests/regression/rhbz2014383.at -@@ -0,0 +1,56 @@ -+FWD_START_TEST([same source in two zone xml]) -+AT_KEYWORDS(zone rhbz2014383) -+ -+AT_CHECK([mkdir -p ./zones]) -+ -+AT_DATA([./zones/foobar.xml], [dnl -+ -+ -+ foobar -+ foobar -+ -+ -+ -+ -+]) -+ -+AT_DATA([./zones/foobar2.xml], [dnl -+ -+ -+ foobar2 -+ foobar2 -+ -+ -+ -+ -+]) -+ -+FWD_CHECK([--check-config], 105, [ignore], [ignore]) -+ -+dnl Do the same thing, but with interfaces -+ -+AT_DATA([./zones/foobar.xml], [dnl -+ -+ -+ foobar -+ foobar -+ -+ -+ -+ -+]) -+ -+AT_DATA([./zones/foobar2.xml], [dnl -+ -+ -+ foobar2 -+ foobar2 -+ -+ -+ -+ -+]) -+ -+FWD_CHECK([--check-config], 104, [ignore], [ignore]) -+ -+FWD_END_TEST([ignore]) --- -2.27.0 - diff --git a/SPECS/firewalld.spec b/SPECS/firewalld.spec index a4ad0e7..5068d9e 100644 --- a/SPECS/firewalld.spec +++ b/SPECS/firewalld.spec @@ -1,61 +1,20 @@ Summary: A firewall daemon with D-Bus interface providing a dynamic firewall Name: firewalld -Version: 0.9.3 -Release: 13%{?dist} +Version: 0.9.11 +Release: 1%{?dist} URL: http://www.firewalld.org License: GPLv2+ Source0: https://github.com/firewalld/firewalld/releases/download/v%{version}/firewalld-%{version}.tar.gz -Patch1: 0001-RHEL-only-Add-cockpit-by-default-to-some-zones.patch -Patch2: 0002-RHEL-only-default-to-AllowZoneDrifting-yes.patch -Patch3: v1.0.0-0003-feat-service-add-galera-service.patch -Patch4: 0004-fix-dbus-conf-setting-deprecated-properties-should-b.patch -Patch5: 0005-test-nftables-normalize-reject-statement-output.patch -Patch6: 0006-test-nftables-fix-normalization-of-reject-statement-.patch -Patch7: 0007-test-functions-increase-debug-level.patch -Patch8: 0008-test-functions-format-xml-output-with-xmllint.patch -Patch9: 0009-docs-firewall-cmd-reload-does-not-affect-direct-rule.patch -Patch10: 0010-docs-dbus-fix-copy-paste-error-for-FlushAllOnReload.patch -Patch11: 0011-docs-dbus-fix-copy-paste-error-for-RFC3964_IPv4.patch -Patch12: 0012-test-dbus-direct-add-coverage-for-signatures.patch -Patch13: 0013-test-dbus-policy-scope-introspection-checks-to-inter.patch -Patch14: 0014-test-dbus-zone-scope-introspection-checks-to-interfa.patch -Patch15: 0015-test-dbus-policy-introspect-signals.patch -Patch16: 0016-test-dbus-zone-introspect-signals.patch -Patch17: 0017-fix-dbus-properties-IPv4-and-IPv6-should-be-true-if-.patch -Patch18: 0018-test-ipset-add-missing-CHECK_IPSET.patch -Patch19: 0019-fix-fw-when-checking-tables-make-sure-to-check-the-a.patch -Patch20: 0020-fix-ipset-nftables-use-interval-flag-for-ip-types.patch -Patch21: 0021-test-ipset-verify-ipset-netmask-allowed-for-hash-ip.patch -Patch22: 0022-test-offline-always-allow-ipset-tests.patch -Patch23: 0023-fix-direct-rule-order-with-multiple-address-with-s-d.patch -Patch24: 0024-test-direct-verify-rule-order-with-multiple-address-.patch -Patch25: 0025-fix-ipset-fix-hash-net-net-functionality.patch -Patch26: 0026-test-ipset-add-test-to-verify-hash-net-net.patch -Patch27: 0027-fix-nm-reload-only-consider-NM-connections-with-a-re.patch -Patch28: 0028-test-nm-reload-only-consider-NM-connections-with-a-r.patch -Patch29: 0029-docs-conf-note-that-IPv6_rpfilter-has-a-performance-.patch -Patch30: 0030-improvement-conf-note-that-IPv6_rpfilter-has-a-perfo.patch -Patch31: 0031-test-functions-FWD_GREP_LOG-allow-checking-error-cod.patch -Patch32: 0032-test-functions-improve-checking-firewalld.log-for-er.patch -Patch33: 0033-fix-policy-warn-instead-of-error-for-overlapping-por.patch -Patch34: 0034-test-zone-verify-overlapping-ports-don-t-halt-zone-l.patch -Patch35: v1.0.0-0035-fix-ipset-normalize-entries-in-CIDR-notation.patch -Patch36: v1.0.0-0036-fix-ipset-disallow-overlapping-entries.patch -Patch37: 0037-docs-firewall-cmd-client-conntrack-helpers-must-use-.patch -Patch38: 0038-fix-nftables-do-not-log-icmp-block-if-inversion.patch -Patch39: 0039-test-icmp-don-t-log-blocked-if-ICMP-inversion.patch -Patch40: 0040-fix-nftables-rich-source-address-with-netmask.patch -Patch41: 0041-test-rich-source-address-with-netmask.patch -Patch42: 0042-test-zone-source-with-netmask.patch -Patch43: 0043-fix-fw_config-zone-on-rename-remove-then-add.patch -Patch44: 0044-fix-io-functions-check_config-against-on-disk-conf.patch -Patch45: 0045-fix-zone-detect-same-source-interface-in-zones.patch -Patch46: 0046-test-zone-detect-same-source-interface-in-zones.patch -Patch47: 0047-feat-config-add-CleanupModulesOnExit-configuration-o.patch -Patch48: 0048-RHEL-only-default-to-CleanupModulesOnExit-yes.patch -Patch49: v1.0.0-0049-fix-ipset-reduce-cost-of-entry-overlap-detection.patch -Patch50: v1.0.0-0050-test-ipset-huge-set-of-entries-benchmark.patch -Patch51: v1.0.0-0051-fix-ipset-further-reduce-cost-of-entry-overlap-detec.patch +Patch1: 0001-RHEL-only-Add-cockpit-by-default-to-some-zones.patch +Patch2: 0002-RHEL-only-default-to-AllowZoneDrifting-yes.patch +Patch3: 0003-v1.0.0-feat-service-add-galera-service-Fixes-rhbz169.patch +Patch4: 0004-v1.0.0-fix-ipset-normalize-entries-in-CIDR-notation.patch +Patch5: 0005-v1.0.0-fix-ipset-disallow-overlapping-entries.patch +Patch6: 0006-v1.0.0-feat-config-add-CleanupModulesOnExit-configur.patch +Patch7: 0007-RHEL-only-default-to-CleanupModulesOnExit-yes.patch +Patch8: 0008-v1.1.0-fix-ipset-reduce-cost-of-entry-overlap-detect.patch +Patch9: 0009-v1.1.0-test-ipset-huge-set-of-entries-benchmark.patch +Patch10: 0010-v1.1.0-fix-ipset-further-reduce-cost-of-entry-overla.patch BuildArch: noarch BuildRequires: autoconf @@ -257,6 +216,9 @@ desktop-file-install --delete-original \ %{_mandir}/man1/firewall-config*.1* %changelog +* Tue Apr 18 2023 Eric Garver - 0.9.11-1 +- rebase to v0.9.11 + * Thu Feb 03 2022 Eric Garver - 0.9.3-13 - change default CleanupModulesOnExit=yes