http://www.firewalld.org/2017/06/firewalld-0-4-4-5-release
- Fix build from spec
- Fix –remove-service-from-zone option (RHBZ#1438127)
- Support sctp and dccp in ports, source-ports, forward-ports, helpers and
rich rules (RHBZ#1429808)
- firewall-cmd: Fix –{set,get}-{short,description} for zone (RHBZ#1445238)
- firewall.core.ipXtables: Use new wait option for restore commands if
available
- New services for oVirt:
ctdb, ovirt-imageio, ovirt-storageconsole, ovirt-vmconsole and nrpe
- Rename extension for policy choices (server and desktop) to .policy.choice
(RHBZ#1449754)
- D-Bus interfaces: Fix GetAll for interfaces without properties
(RHBZ#1452017)
- Load NAT helpers with conntrack helpers (RHBZ#1452681)
- Translation updates
- Additional upstream patches:
- Rich-rule source validation (d69b7cb)
- IPv6 ICMP type only rich-rule fix (cf50bd0)
http://www.firewalld.org/2017/03/firewalld-0-4-4-4-release
- Drop references to fedorahosted.org from spec file and Makefile.am
- Fix inconsistent ordering of rules in INPUT_ZONE_SOURCE (issue#166)
- Fix ipset overloading from /etc/firewalld/ipsets
- Fix permanent rich rules using icmp-type elements (RHBZ#1434594)
- firewall-config: Deactivate edit, remove, .. buttons if there are no items
- Check if ICMP types are supported by kernel before trying to use them
- firewall-config: Show invalid ipset type in the ipset configuration dialog
in a special label
http://www.firewalld.org/2017/02/firewalld-0-4-4-3-release
- Speed up of large file loading
- Support for more ipset types
- Speed up of adding or removing entries for ipsets from files
- Support icmp-type usage in rich rules
- Support for more icmp types
- Support for h323 conntrack helper
- New services
- Code cleanup and several other bug fixes
- Translation updates
firewalld (RHBZ#1396765) (RHBZ#1394625) (RHBZ#1394578) (RHBZ#1394573)
(RHBZ#1394569)
- New firewalld release 0.4.4.2:
- firewalld.spec: Added helpers and ipsets paths to firewalld-filesystem
- firewall.core.fw_nm: create NMClient lazily
- Do not use hard-coded path for modinfo, use autofoo to detect it
- firewall.core.io.ifcfg: Dropped invalid option warning with bad format
string
- firewall.core.io.ifcfg: Properly handle quoted ifcfg values
- firewall.core.fw_zone: Do not reset ZONE with ifdown
- Updated translations from zanata
- firewall-config: Extra grid at bottom to visualize firewalld settings