[firewalld/f19] New version 0.3.3
Thomas Woerner
twoerner at fedoraproject.org
Thu Jun 6 16:17:33 UTC 2013
commit 09913dec88462fbe27adf85ce695e24d8fb7c334
Author: Thomas Woerner <twoerner at redhat.com>
Date: Thu Jun 6 18:16:48 2013 +0200
New version 0.3.3
- new service files
- relicensed logger.py under GPLv2+
- firewall-config: sometimes we don't want to use client's exception handler
- When removing Service/IcmpType remove it from zones too (RHBZ#958401)
- firewall-config: work-around masquerade_check_cb() being called more times
- Zone(IO): add interfaces/sources to D-Bus signature
- Added missing UNKNOWN_SOURCE error code
- fw_zone.check_source: Raise INVALID_FAMILY if family is invalid
- New changeZoneOfInterface method, marked changeZone as deprecated
- Fixed firewall-cmd man page entry for --panic-on
- firewall-applet: Fixed possible problems of unescaped strings used for markup
- New support to bind zones to source addresses and ranges (D-BUS, cmd, applet
- Cleanup of unused variables in FirewallD.start
- New firewall/fw_types.py with LastUpdatedOrderedDict
- direct.chains, direct.rules: Using LastUpdatedOrderedDict
- Support splitted zone files
- New reader and writer for stored direct chains and rules
- LockdownWhitelist: fix write(), add get_commands/uids/users/contexts()
- fix service_writer() and icmptype_writer() to put newline at end of file
- firewall-cmd: fix --list-sources
- No need to specify whether source address family is IPv4 or IPv6
- add getZoneOfSource() to D-Bus interface
- Add tests and bash-completion for the new "source" operations
- Convert all input args in D-Bus methods
- setDefaultZone() was calling accessCheck() *after* the action
- New uniqify() function to remove duplicates from list whilst preserving order
- Zone.combine() merge also services and ports
- config/applet: silence DBusException during start when FirewallD is not running (RHBZ#966518)
- firewall-applet: more fixes to make the address sources family agnostic
- Better defaults for lockdown white list
- Use auth_admin_keep for allow_any and allow_inactive also
- New D-Bus API for lockdown policies
- Use IPv4, IPv6 and BRIDGE for FirewallD properties
- Use rich rule action as audit type
- Prototype of string-only D-Bus interface for rich language
- Fixed wrongly merged source family check in firewall/core/io/zone.py
- handle_cmr: report errors, cleanup modules in error case only, mark handling
- Use audit type from rule action, fixed rule output
- Fixed lockdown whitelist D-Bus handling method names
- New rich rule handling in runtime D-Bus interface
- Added interface, source and rich rule handling (runtime and permanent)
- Fixed dbus_obj in FirewallClientConfigPolicies, added queryLockdown
- Write changes in setLockdownWhitelist
- Fixed typo in policies log message in method calls
- firewall-cmd: Added rich rule, lockdown and lockdown whitelist handling
- Don't check access in query/getLockdownWhitelist*()
- firewall-cmd: Also output masquerade flag in --list-all
- firewall-cmd: argparse is able to convert argument to desired type itself
- firewall-cmd_test.sh: tests for permanent interfaces/sources and lockdown whitelist
- Makefile.am: add missing files
- firewall-cmd_test.sh: tests for rich rules
- Added lockdown, source, interface and rich rule docs to firewall-cmd
- Do not masquerade lo if masquerade is enabled in the default zone (RHBZ#904098)
- Use <rule> in metavar for firewall-cmd parser
.gitignore | 1 +
firewalld.spec | 60 ++++++++++++++++++++++++++++++++++++++++++++++++++++++-
sources | 2 +-
3 files changed, 60 insertions(+), 3 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 482656b..9cb4281 100644
--- a/.gitignore
+++ b/.gitignore
@@ -16,3 +16,4 @@
/firewalld-0.3.0.tar.bz2
/firewalld-0.3.1.tar.bz2
/firewalld-0.3.2.tar.bz2
+/firewalld-0.3.3.tar.bz2
diff --git a/firewalld.spec b/firewalld.spec
index e61e310..146a342 100644
--- a/firewalld.spec
+++ b/firewalld.spec
@@ -1,7 +1,7 @@
Summary: A firewall daemon with D-BUS interface providing a dynamic firewall
Name: firewalld
-Version: 0.3.2
-Release: 2%{?dist}
+Version: 0.3.3
+Release: 1%{?dist}
URL: http://fedorahosted.org/firewalld
License: GPLv2+
ExclusiveOS: Linux
@@ -194,6 +194,62 @@ fi
%{_datadir}/icons/hicolor/*/apps/firewall-config*.*
%changelog
+* Thu Jun 6 2013 Thomas Woerner <twoerner at redhat.com> 0.3.3-1
+- new service files
+- relicensed logger.py under GPLv2+
+- firewall-config: sometimes we don't want to use client's exception handler
+- When removing Service/IcmpType remove it from zones too (RHBZ#958401)
+- firewall-config: work-around masquerade_check_cb() being called more times
+- Zone(IO): add interfaces/sources to D-Bus signature
+- Added missing UNKNOWN_SOURCE error code
+- fw_zone.check_source: Raise INVALID_FAMILY if family is invalid
+- New changeZoneOfInterface method, marked changeZone as deprecated
+- Fixed firewall-cmd man page entry for --panic-on
+- firewall-applet: Fixed possible problems of unescaped strings used for markup
+- New support to bind zones to source addresses and ranges (D-BUS, cmd, applet
+- Cleanup of unused variables in FirewallD.start
+- New firewall/fw_types.py with LastUpdatedOrderedDict
+- direct.chains, direct.rules: Using LastUpdatedOrderedDict
+- Support splitted zone files
+- New reader and writer for stored direct chains and rules
+- LockdownWhitelist: fix write(), add get_commands/uids/users/contexts()
+- fix service_writer() and icmptype_writer() to put newline at end of file
+- firewall-cmd: fix --list-sources
+- No need to specify whether source address family is IPv4 or IPv6
+- add getZoneOfSource() to D-Bus interface
+- Add tests and bash-completion for the new "source" operations
+- Convert all input args in D-Bus methods
+- setDefaultZone() was calling accessCheck() *after* the action
+- New uniqify() function to remove duplicates from list whilst preserving order
+- Zone.combine() merge also services and ports
+- config/applet: silence DBusException during start when FirewallD is not running (RHBZ#966518)
+- firewall-applet: more fixes to make the address sources family agnostic
+- Better defaults for lockdown white list
+- Use auth_admin_keep for allow_any and allow_inactive also
+- New D-Bus API for lockdown policies
+- Use IPv4, IPv6 and BRIDGE for FirewallD properties
+- Use rich rule action as audit type
+- Prototype of string-only D-Bus interface for rich language
+- Fixed wrongly merged source family check in firewall/core/io/zone.py
+- handle_cmr: report errors, cleanup modules in error case only, mark handling
+- Use audit type from rule action, fixed rule output
+- Fixed lockdown whitelist D-Bus handling method names
+- New rich rule handling in runtime D-Bus interface
+- Added interface, source and rich rule handling (runtime and permanent)
+- Fixed dbus_obj in FirewallClientConfigPolicies, added queryLockdown
+- Write changes in setLockdownWhitelist
+- Fixed typo in policies log message in method calls
+- firewall-cmd: Added rich rule, lockdown and lockdown whitelist handling
+- Don't check access in query/getLockdownWhitelist*()
+- firewall-cmd: Also output masquerade flag in --list-all
+- firewall-cmd: argparse is able to convert argument to desired type itself
+- firewall-cmd_test.sh: tests for permanent interfaces/sources and lockdown whitelist
+- Makefile.am: add missing files
+- firewall-cmd_test.sh: tests for rich rules
+- Added lockdown, source, interface and rich rule docs to firewall-cmd
+- Do not masquerade lo if masquerade is enabled in the default zone (RHBZ#904098)
+- Use <rule> in metavar for firewall-cmd parser
+
* Fri May 10 2013 Jiri Popelka <jpopelka at redhat.com> - 0.3.2-2
- removed unintentional en_US.po from tarball
diff --git a/sources b/sources
index 86e048e..a2bae97 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-c048aef683a7e5a353ef25e411c534c0 firewalld-0.3.2.tar.bz2
+69b4ba29ecd59e328c725282cacf1311 firewalld-0.3.3.tar.bz2
More information about the scm-commits
mailing list