New version 0.3.0
- Added rich language support - Added lockdown feature - Allow to bind interfaces and sources to zones permanently - Enabled IPv6 NAT support masquerading and port/packet forwarding for IPv6 only with rich language - Handle polkit errors in client class and firewall-config - Added priority description for --direct --add-rule in firewall-cmd man page - Add XML Schemas for zones/services/icmptypes XMLs - Don't keep file descriptors open when forking - Introduce --nopid option for firewalld - New FORWARD_IN_ZONES and FORWARD_OUT_ZONES chains (RHBZ#912782) - Update cluster-suite service (RHBZ#885257) - firewall-cmd: rename --enable/disable-panic to --panic-on/off (RHBZ#874912) - Fix interaction problem of changed event of gtk combobox with polkit-kde by processing all remaining events (RHBZ#915892) - Stop default zone rules being applied to all zones (RHBZ#912782) - Firewall.start(): don't call set_default_zone() - Add wiki's URL to firewalld(1) and firewall-cmd(1) man pages - firewalld-cmd: make --state verbose (RHBZ#886484) - improve firewalld --help (RHBZ#910492) - firewall-cmd: --add/remove-* can be used multiple times (RHBZ#879834) - Continue loading zone in case of wrong service/port etc. (RHBZ#909466) - Check also services and icmptypes in Zone() (RHBZ#909466) - Increase the maximum length of the port forwarding fields from 5 to 11 in firewall-config - firewall-cmd: add usage to fail message - firewall-cmd: redefine usage to point to man page - firewall-cmd: fix visible problems with arg. parsing - Use argparse module for parsing command line options and arguments - firewall-cmd.1: better clarify where to find ACTIONs - firewall-cmd Bash completion - firewall-cmd.1: comment --zone=<zone> usage and move some options - Use zone's target only in %s_ZONES chains - default zone in firewalld.conf was set to public with every restart (#902845) - man page cleanup - code cleanup
This commit is contained in:
parent
241828c972
commit
7b258f3cda
1
.gitignore
vendored
1
.gitignore
vendored
@ -13,3 +13,4 @@
|
|||||||
/firewalld-0.2.10.tar.bz2
|
/firewalld-0.2.10.tar.bz2
|
||||||
/firewalld-0.2.11.tar.bz2
|
/firewalld-0.2.11.tar.bz2
|
||||||
/firewalld-0.2.12.tar.bz2
|
/firewalld-0.2.12.tar.bz2
|
||||||
|
/firewalld-0.3.0.tar.bz2
|
||||||
|
@ -1,32 +0,0 @@
|
|||||||
From 3253df596ab6f5e43d22dff3049600fc0de9c41b Mon Sep 17 00:00:00 2001
|
|
||||||
From: Jiri Popelka <jpopelka@redhat.com>
|
|
||||||
Date: Wed, 20 Feb 2013 14:58:40 +0100
|
|
||||||
Subject: [PATCH 1/2] Stop default zone rules being applied to all zones
|
|
||||||
(RHBZ#912782)
|
|
||||||
|
|
||||||
See https://bugzilla.redhat.com/show_bug.cgi?id=912782
|
|
||||||
for description.
|
|
||||||
|
|
||||||
Patch from Quentin Armitage
|
|
||||||
---
|
|
||||||
src/firewall/core/fw_zone.py | 3 ++-
|
|
||||||
1 file changed, 2 insertions(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/firewall/core/fw_zone.py b/src/firewall/core/fw_zone.py
|
|
||||||
index 6d874e5..0fd0267 100644
|
|
||||||
--- a/src/firewall/core/fw_zone.py
|
|
||||||
+++ b/src/firewall/core/fw_zone.py
|
|
||||||
@@ -272,8 +272,9 @@ class FirewallZone:
|
|
||||||
if target == "DROP" and table == "nat":
|
|
||||||
# DROP is not supported in nat table
|
|
||||||
continue
|
|
||||||
+ action = "-g" if "_ZONE_" in target else "-j"
|
|
||||||
rule = [ "%s_ZONES" % src_chain, "-t", table,
|
|
||||||
- opt, interface, "-j", target ]
|
|
||||||
+ opt, interface, action, target ]
|
|
||||||
if enable and not append:
|
|
||||||
rule.insert(1, "1")
|
|
||||||
rules.append((ipv, rule))
|
|
||||||
--
|
|
||||||
1.8.1.2
|
|
||||||
|
|
@ -1,72 +0,0 @@
|
|||||||
From 41a1a4c69448991bb89b22081b29bffe47bfcca1 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Jiri Popelka <jpopelka@redhat.com>
|
|
||||||
Date: Wed, 6 Mar 2013 17:21:00 +0100
|
|
||||||
Subject: [PATCH] FORWARD_IN_ZONES and FORWARD_OUT_ZONES chains
|
|
||||||
(RHBZ#912782)
|
|
||||||
|
|
||||||
We need to separate top-level FORWARD_ZONES chain
|
|
||||||
into these two chains to be able to correctly match
|
|
||||||
rules for input and output interface, see
|
|
||||||
https://bugzilla.redhat.com/show_bug.cgi?id=912782#c11
|
|
||||||
---
|
|
||||||
src/firewall/core/base.py | 4 ++--
|
|
||||||
src/firewall/core/fw_zone.py | 2 +-
|
|
||||||
src/firewall/core/ipXtables.py | 10 ++++++----
|
|
||||||
3 files changed, 9 insertions(+), 7 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/firewall/core/base.py b/src/firewall/core/base.py
|
|
||||||
index b89870d..1dcf30b 100644
|
|
||||||
--- a/src/firewall/core/base.py
|
|
||||||
+++ b/src/firewall/core/base.py
|
|
||||||
@@ -44,8 +44,8 @@ INTERFACE_ZONE_SRC = {
|
|
||||||
"PREROUTING": "PREROUTING",
|
|
||||||
"POSTROUTING": "POSTROUTING",
|
|
||||||
"INPUT": "INPUT",
|
|
||||||
- "FORWARD_IN": "FORWARD",
|
|
||||||
- "FORWARD_OUT": "FORWARD",
|
|
||||||
+ "FORWARD_IN": "FORWARD_IN",
|
|
||||||
+ "FORWARD_OUT": "FORWARD_OUT",
|
|
||||||
"OUTPUT": "OUTPUT",
|
|
||||||
}
|
|
||||||
|
|
||||||
diff --git a/src/firewall/core/fw_zone.py b/src/firewall/core/fw_zone.py
|
|
||||||
index 2b0ac8b..c72055e 100644
|
|
||||||
--- a/src/firewall/core/fw_zone.py
|
|
||||||
+++ b/src/firewall/core/fw_zone.py
|
|
||||||
@@ -264,7 +264,7 @@ class FirewallZone:
|
|
||||||
target = self._zones[zone].target.format(
|
|
||||||
chain=SHORTCUTS[chain], zone=zone)
|
|
||||||
if target in [ "REJECT", "%%REJECT%%" ] and \
|
|
||||||
- src_chain not in [ "INPUT", "FORWARD", "OUTPUT" ]:
|
|
||||||
+ src_chain not in [ "INPUT", "FORWARD_IN", "FORWARD_OUT", "OUTPUT" ]:
|
|
||||||
# REJECT is only valid in the INPUT, FORWARD and
|
|
||||||
# OUTPUT chains, and user-defined chains which are
|
|
||||||
# only called from those chains
|
|
||||||
diff --git a/src/firewall/core/ipXtables.py b/src/firewall/core/ipXtables.py
|
|
||||||
index d172151..311f9e4 100644
|
|
||||||
--- a/src/firewall/core/ipXtables.py
|
|
||||||
+++ b/src/firewall/core/ipXtables.py
|
|
||||||
@@ -83,14 +83,16 @@ DEFAULT_RULES["filter"] = [
|
|
||||||
"-I INPUT 6 -j %%REJECT%%",
|
|
||||||
|
|
||||||
"-N FORWARD_direct",
|
|
||||||
- "-N FORWARD_ZONES",
|
|
||||||
+ "-N FORWARD_IN_ZONES",
|
|
||||||
+ "-N FORWARD_OUT_ZONES",
|
|
||||||
|
|
||||||
"-I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT",
|
|
||||||
"-I FORWARD 2 -i lo -j ACCEPT",
|
|
||||||
"-I FORWARD 3 -j FORWARD_direct",
|
|
||||||
- "-I FORWARD 4 -j FORWARD_ZONES",
|
|
||||||
- "-I FORWARD 5 -p %%ICMP%% -j ACCEPT",
|
|
||||||
- "-I FORWARD 6 -j %%REJECT%%",
|
|
||||||
+ "-I FORWARD 4 -j FORWARD_IN_ZONES",
|
|
||||||
+ "-I FORWARD 5 -j FORWARD_OUT_ZONES",
|
|
||||||
+ "-I FORWARD 6 -p %%ICMP%% -j ACCEPT",
|
|
||||||
+ "-I FORWARD 7 -j %%REJECT%%",
|
|
||||||
|
|
||||||
"-N OUTPUT_direct",
|
|
||||||
|
|
||||||
--
|
|
||||||
1.8.1.4
|
|
||||||
|
|
@ -1,26 +0,0 @@
|
|||||||
From 0a9017067bd04a1370faa461ceede31316f1caaa Mon Sep 17 00:00:00 2001
|
|
||||||
From: Jiri Popelka <jpopelka@redhat.com>
|
|
||||||
Date: Tue, 22 Jan 2013 16:27:56 +0100
|
|
||||||
Subject: [PATCH 4/5] default zone in firewalld.conf was set to public with
|
|
||||||
every restart (#902845)
|
|
||||||
|
|
||||||
---
|
|
||||||
src/firewall/core/io/firewalld_conf.py | 2 +-
|
|
||||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/firewall/core/io/firewalld_conf.py b/src/firewall/core/io/firewalld_conf.py
|
|
||||||
index 159df99..911f8bf 100644
|
|
||||||
--- a/src/firewall/core/io/firewalld_conf.py
|
|
||||||
+++ b/src/firewall/core/io/firewalld_conf.py
|
|
||||||
@@ -37,7 +37,7 @@ class firewalld_conf:
|
|
||||||
self._deleted = [ ]
|
|
||||||
|
|
||||||
def get(self, key):
|
|
||||||
- self._config.get(key.strip())
|
|
||||||
+ return self._config.get(key.strip())
|
|
||||||
|
|
||||||
def set(self, key, value):
|
|
||||||
_key = key.strip()
|
|
||||||
--
|
|
||||||
1.8.1
|
|
||||||
|
|
@ -1,26 +0,0 @@
|
|||||||
From 964bd061f00c9e90935430ba3036b228800cd5ed Mon Sep 17 00:00:00 2001
|
|
||||||
From: Jiri Popelka <jpopelka@redhat.com>
|
|
||||||
Date: Wed, 16 Jan 2013 14:17:10 +0100
|
|
||||||
Subject: [PATCH 2/5] firewall-config: fix typo gtk -> Gtk
|
|
||||||
|
|
||||||
Fixes: RHBZ#895812
|
|
||||||
---
|
|
||||||
src/firewall-config | 2 +-
|
|
||||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/firewall-config b/src/firewall-config
|
|
||||||
index b783268..1f0b5dc 100755
|
|
||||||
--- a/src/firewall-config
|
|
||||||
+++ b/src/firewall-config
|
|
||||||
@@ -839,7 +839,7 @@ class FirewallConfig(object):
|
|
||||||
if default_zone in zones:
|
|
||||||
selection.select_path(zones.index(default_zone))
|
|
||||||
else:
|
|
||||||
- selection.set_mode(gtk.SelectionMode.NONE)
|
|
||||||
+ selection.set_mode(Gtk.SelectionMode.NONE)
|
|
||||||
|
|
||||||
self.defaultZoneDialog.set_position(Gtk.WindowPosition.CENTER_ON_PARENT)
|
|
||||||
self.defaultZoneDialog.set_transient_for(self.mainWindow)
|
|
||||||
--
|
|
||||||
1.8.1
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
Summary: A firewall daemon with D-BUS interface providing a dynamic firewall
|
Summary: A firewall daemon with D-BUS interface providing a dynamic firewall
|
||||||
Name: firewalld
|
Name: firewalld
|
||||||
Version: 0.2.12
|
Version: 0.3.0
|
||||||
Release: 5%{?dist}
|
Release: 1%{?dist}
|
||||||
URL: http://fedorahosted.org/firewalld
|
URL: http://fedorahosted.org/firewalld
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
ExclusiveOS: Linux
|
ExclusiveOS: Linux
|
||||||
@ -11,10 +11,6 @@ Source0: https://fedorahosted.org/released/firewalld/%{name}-%{version}.tar.bz2
|
|||||||
%if 0%{?fedora} > 17
|
%if 0%{?fedora} > 17
|
||||||
Patch0: firewalld-0.2.6-MDNS-default.patch
|
Patch0: firewalld-0.2.6-MDNS-default.patch
|
||||||
%endif
|
%endif
|
||||||
Patch1: firewalld-0.2.12-conf.patch
|
|
||||||
Patch2: firewalld-0.2.12-gtk.patch
|
|
||||||
Patch3: firewalld-0.2.12-bz912782.patch
|
|
||||||
Patch4: firewalld-0.2.12-bz912782_2.patch
|
|
||||||
BuildRequires: desktop-file-utils
|
BuildRequires: desktop-file-utils
|
||||||
BuildRequires: gettext
|
BuildRequires: gettext
|
||||||
BuildRequires: intltool
|
BuildRequires: intltool
|
||||||
@ -80,11 +76,6 @@ firewalld.
|
|||||||
%patch0 -p1
|
%patch0 -p1
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
%patch1 -p1
|
|
||||||
%patch2 -p1
|
|
||||||
%patch3 -p1
|
|
||||||
%patch4 -p1
|
|
||||||
|
|
||||||
%build
|
%build
|
||||||
%configure --with-systemd-unitdir=%{_unitdir}
|
%configure --with-systemd-unitdir=%{_unitdir}
|
||||||
|
|
||||||
@ -152,6 +143,8 @@ fi
|
|||||||
%{_sbindir}/firewalld
|
%{_sbindir}/firewalld
|
||||||
%{_bindir}/firewall-cmd
|
%{_bindir}/firewall-cmd
|
||||||
%{_bindir}/firewall-offline-cmd
|
%{_bindir}/firewall-offline-cmd
|
||||||
|
%dir %{_sysconfdir}/bash_completion.d
|
||||||
|
%{_sysconfdir}/bash_completion.d/firewall-cmd-bash-completion.sh
|
||||||
%defattr(0640,root,root)
|
%defattr(0640,root,root)
|
||||||
%attr(0750,root,root) %dir %{_prefix}/lib/firewalld
|
%attr(0750,root,root) %dir %{_prefix}/lib/firewalld
|
||||||
%attr(0750,root,root) %dir %{_prefix}/lib/firewalld/icmptypes
|
%attr(0750,root,root) %dir %{_prefix}/lib/firewalld/icmptypes
|
||||||
@ -162,6 +155,7 @@ fi
|
|||||||
%{_prefix}/lib/firewalld/zones/*.xml
|
%{_prefix}/lib/firewalld/zones/*.xml
|
||||||
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld
|
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld
|
||||||
%config(noreplace) %{_sysconfdir}/firewalld/firewalld.conf
|
%config(noreplace) %{_sysconfdir}/firewalld/firewalld.conf
|
||||||
|
%config(noreplace) %{_sysconfdir}/firewalld/lockdown-whitelist.xml
|
||||||
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/icmptypes
|
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/icmptypes
|
||||||
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/services
|
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/services
|
||||||
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/zones
|
%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/zones
|
||||||
@ -200,6 +194,44 @@ fi
|
|||||||
%{_datadir}/icons/hicolor/*/apps/firewall-config*.*
|
%{_datadir}/icons/hicolor/*/apps/firewall-config*.*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Mar 20 2013 Thomas Woerner <twoerner@redhat.com> 0.3.0-1
|
||||||
|
- Added rich language support
|
||||||
|
- Added lockdown feature
|
||||||
|
- Allow to bind interfaces and sources to zones permanently
|
||||||
|
- Enabled IPv6 NAT support
|
||||||
|
masquerading and port/packet forwarding for IPv6 only with rich language
|
||||||
|
- Handle polkit errors in client class and firewall-config
|
||||||
|
- Added priority description for --direct --add-rule in firewall-cmd man page
|
||||||
|
- Add XML Schemas for zones/services/icmptypes XMLs
|
||||||
|
- Don't keep file descriptors open when forking
|
||||||
|
- Introduce --nopid option for firewalld
|
||||||
|
- New FORWARD_IN_ZONES and FORWARD_OUT_ZONES chains (RHBZ#912782)
|
||||||
|
- Update cluster-suite service (RHBZ#885257)
|
||||||
|
- firewall-cmd: rename --enable/disable-panic to --panic-on/off (RHBZ#874912)
|
||||||
|
- Fix interaction problem of changed event of gtk combobox with polkit-kde
|
||||||
|
by processing all remaining events (RHBZ#915892)
|
||||||
|
- Stop default zone rules being applied to all zones (RHBZ#912782)
|
||||||
|
- Firewall.start(): don't call set_default_zone()
|
||||||
|
- Add wiki's URL to firewalld(1) and firewall-cmd(1) man pages
|
||||||
|
- firewalld-cmd: make --state verbose (RHBZ#886484)
|
||||||
|
- improve firewalld --help (RHBZ#910492)
|
||||||
|
- firewall-cmd: --add/remove-* can be used multiple times (RHBZ#879834)
|
||||||
|
- Continue loading zone in case of wrong service/port etc. (RHBZ#909466)
|
||||||
|
- Check also services and icmptypes in Zone() (RHBZ#909466)
|
||||||
|
- Increase the maximum length of the port forwarding fields from 5 to 11 in
|
||||||
|
firewall-config
|
||||||
|
- firewall-cmd: add usage to fail message
|
||||||
|
- firewall-cmd: redefine usage to point to man page
|
||||||
|
- firewall-cmd: fix visible problems with arg. parsing
|
||||||
|
- Use argparse module for parsing command line options and arguments
|
||||||
|
- firewall-cmd.1: better clarify where to find ACTIONs
|
||||||
|
- firewall-cmd Bash completion
|
||||||
|
- firewall-cmd.1: comment --zone=<zone> usage and move some options
|
||||||
|
- Use zone's target only in %s_ZONES chains
|
||||||
|
- default zone in firewalld.conf was set to public with every restart (#902845)
|
||||||
|
- man page cleanup
|
||||||
|
- code cleanup
|
||||||
|
|
||||||
* Thu Mar 07 2013 Jiri Popelka <jpopelka@redhat.com> - 0.2.12-5
|
* Thu Mar 07 2013 Jiri Popelka <jpopelka@redhat.com> - 0.2.12-5
|
||||||
- Another fix for RHBZ#912782
|
- Another fix for RHBZ#912782
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user