Revisions of firewalld
Dominique Leuenberger (dimstar_suse)
accepted
request 984239
from
Callum Farmer (gmbr3)
(revision 67)
Dominique Leuenberger (dimstar_suse)
accepted
request 966068
from
Callum Farmer (gmbr3)
(revision 66)
Dominique Leuenberger (dimstar_suse)
accepted
request 964017
from
Michał Rostecki (mrostecki)
(revision 65)
Dominique Leuenberger (dimstar_suse)
accepted
request 960423
from
Callum Farmer (gmbr3)
(revision 64)
Dominique Leuenberger (dimstar_suse)
accepted
request 959443
from
Callum Farmer (gmbr3)
(revision 63)
Dominique Leuenberger (dimstar_suse)
accepted
request 957780
from
Callum Farmer (gmbr3)
(revision 62)
1.1.0
Dominique Leuenberger (dimstar_suse)
accepted
request 946416
from
Callum Farmer (gmbr3)
(revision 61)
1.0.3
Dominique Leuenberger (dimstar_suse)
accepted
request 932170
from
Michał Rostecki (mrostecki)
(revision 60)
- Update to 1.0.2: * fix(firewalld): check capng_apply() return code * fix(nftables): do not log icmp block if inversion * fix(nftables): rich: source address with netmask * fix(fw_config): zone: on rename remove then add * fix(io/functions): check_config against on disk conf * fix(zone): detect same source/interface in zones * docs(policy): fix typos * docs(policies): fix typos (forwarded request 932169 from mrostecki)
Dominique Leuenberger (dimstar_suse)
accepted
request 924225
from
Michał Rostecki (mrostecki)
(revision 59)
Richard Brown (RBrownSUSE)
accepted
request 883555
from
Michał Rostecki (mrostecki)
(revision 57)
- Remove dependency on firewalld from firewall-macros (bsc#1183404) (forwarded request 883554 from mrostecki)
Dominique Leuenberger (dimstar_suse)
accepted
request 873150
from
Michał Rostecki (mrostecki)
(revision 56)
Preserve the reference to jsc#SLE-12281 in the old update to 0.7.5 (forwarded request 873148 from mrostecki)
Dominique Leuenberger (dimstar_suse)
accepted
request 866985
from
Michał Rostecki (mrostecki)
(revision 55)
- Update to 0.9.3 (jsc#SLE-17336): nftables (jsc#SLE-16300): (rhbz#1817022, jsc#SLE-16300) (forwarded request 866984 from mrostecki)
Dominique Leuenberger (dimstar_suse)
accepted
request 863088
from
Michał Rostecki (mrostecki)
(revision 54)
Dominique Leuenberger (dimstar_suse)
accepted
request 853450
from
Michał Rostecki (mrostecki)
(revision 53)
- Remove the patch which enforces usage of iptables instead of nftables: * 0001-firewall-backend-Switch-default-backend-to-iptables.patch - Add firewalld zone for the docker0 interface. This is the workaround for lack of nftables support in docker. Without that additional zone, containers have no Internet connectivity. (rhbz#1817022) - Update to 0.9.1: * Bugfixes: * docs(firewall-cmd): clarify lockdown whitelist command paths * fix(dbus): getActivePolicies shouldn't return a policy if a zone is not active * fix(policy): zone interface/source changes should affect all using zone
Dominique Leuenberger (dimstar_suse)
committed
(revision 52)
https://bugzilla.opensuse.org/show_bug.cgi?id=1178801
Dominique Leuenberger (dimstar_suse)
accepted
request 847328
from
Michał Rostecki (mrostecki)
(revision 51)
- Remove the patch which enforces usage of iptables instead of nftables: * 0001-firewall-backend-Switch-default-backend-to-iptables.patch - Add firewalld zone for the docker0 interface. This is the workaround for lack of nftables support in docker. Without that additional zone, containers have no Internet connectivity. (rhbz#1817022) - Update to 0.9.1: * Bugfixes: * docs(firewall-cmd): clarify lockdown whitelist command paths * fix(dbus): getActivePolicies shouldn't return a policy if a zone is not active * fix(policy): zone interface/source changes should affect all using zone (forwarded request 847325 from mrostecki)
Dominique Leuenberger (dimstar_suse)
accepted
request 836462
from
Robert Frohl (rfrohl)
(revision 50)
Dominique Leuenberger (dimstar_suse)
accepted
request 833252
from
Michał Rostecki (mrostecki)
(revision 49)
- Add python3-nftables as a requirement. (forwarded request 833251 from mrostecki)
Dominique Leuenberger (dimstar_suse)
accepted
request 826047
from
Michał Rostecki (mrostecki)
(revision 48)
- Update to version 0.7.5: * release: v0.7.5 * chore(translation): merge from master * fix(cli): add ipset type hash:mac is incompatible with the family parameter Fixes: rhbz1541077 * test(rhbz1483921): better test name * fix(cli): add --zone is an invalid option with --direct * fix: core: rich: Catch ValueError on non-numeric priority values * fix: update dynamic DCE RPC ports in freeipa-trust service * docs: replace occurrences of the term blacklist with denylist * docs(README): add libxslt for doc generation * test(rich): source mac with nftables backend * fix(firewall-offline-cmd): remove instances of "[P]" in help text * test(check-container): add support for centos8 stream * test(functions): use IndividualCalls if host doesn't support nft rule index * test(functions): add macro IF_HOST_SUPPORTS_NFT_RULE_INDEX * test(dbus): better way to check IPv6_rpfilter expected value * fix(ipset): flush the set if IndividiualCalls=yes * test(ipv6): skip square bracket address tests if ipv6 not available * test(gh509): only run test for nftables backend * fix(dbus): service: don't cleanup config for old set APIs * fix(config): bool values in dict based import/export * fix(doc): dbus: signatures for zone tuple based APIs * test(dbus): zone: fix zone runtime functional test title * test(dbus): zone: fix false failure due to list order * fix(client): addService needs to reduce tuple size * test(direct): rule in a zone chain * fix(direct): rule in a zone chain * test(dbus): zone: verify runtime config APIs * test(dbus): zone: verify permanent config APIs * fix(systemd): Conflict with nftables.service (forwarded request 826046 from mrostecki)
Displaying revisions 21 - 40 of 87