firewalld-0.3.14.2-4.fc22$>%T=V'p?eU>D?d   ` ! 0<U[bl t   | 5( 58;?<?`BB`BC(C8CD9ED:QzD>?@BG,HIXYZ[\]^b?bdefltuv8 wx Hy Cfirewalld0.3.14.24.fc22A firewall daemon with D-Bus interface providing a dynamic firewallfirewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface.Ubuildvm-17.phx2.fedoraproject.orgPFedora ProjectFedora ProjectGPLv2+Fedora ProjectUnspecifiedhttp://www.firewalld.orglinuxnoarch if [ $1 -eq 1 ] ; then # Initial installation systemctl preset firewalld.service >/dev/null 2>&1 || : fi if [ $1 -eq 0 ] ; then # Package removal, not upgrade systemctl --no-reload disable firewalld.service > /dev/null 2>&1 || : systemctl stop firewalld.service > /dev/null 2>&1 || : fi systemctl daemon-reload >/dev/null 2>&1 || : if [ $1 -ge 1 ] ; then # Package upgrade, not uninstall systemctl try-restart firewalld.service >/dev/null 2>&1 || : fi< Iu@Z1ZDD;vatDO e)7Q&-PQ6!<W +%#0qTPAoF {?q:Aqp>>hnA<tW(/9`@An3}tu˻ mds4qoS@pm>.*e#hYh E4' (Pc LA聤A聤AA聤큤A큤A큤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@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootfirewalld-0.3.14.2-4.fc22.src.rpmconfig(firewalld)firewalldvariant_config(Server)variant_config(Workstation)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/pythonconfig(firewalld)ebtablesfirewalld-filesystemiptablespython-firewallrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)systemdsystemdsystemd0.3.14.2-4.fc220.3.14.2-4.fc220.3.14.2-4.fc223.0.4-14.6.0-14.0-15.2-14.12.0.1UU@UUa@UU~@UzUzUKSU/@U@U@T@T@TLT=@S@S%@SSR@S@SSSR'R@RR@RxR_@RNRM\@RL RIgQQQ@QyQ@Q@QnQT0QIQ8@Q$Q@P@P@P@P @PpP~PIP3x@P(@P!@OOOc+@OaOU@OTOC@O1@O/MY@M!@M!@ME@Adam Williamson - 0.3.14.2-4Thomas Woerner - 0.3.14.2-3Thomas Woerner - 0.3.14.2-2Thomas Woerner - 0.3.14.2-1Stephen Gallagher 0.3.14.1-2Thomas Woerner - 0.3.14.1-1.1Thomas Woerner - 0.3.14.1-1Thomas Woerner - 0.3.14-1Stephen Gallagher 0.3.13-7Stephen Gallagher 0.3.13-6Stephen Gallagher 0.3.13-5Stephen Gallagher 0.3.13-4Jiri Popelka - 0.3.13-3Thomas Woerner - 0.3.13-2Jiri Popelka - 0.3.13-1Jiri Popelka - 0.3.12-1Jiri Popelka - 0.3.11-3Jiri Popelka - 0.3.11-2Jiri Popelka - 0.3.11-1Thomas Woerner - 0.3.10-5Thomas Woerner - 0.3.10-4Thomas Woerner - 0.3.10-3Fedora Release Engineering - 0.3.10-2Jiri Popelka - 0.3.10-1Jiri Popelka - 0.3.9.3-1Jiri Popelka - 0.3.9.2-1Jiri Popelka - 0.3.9.1-1Jiri Popelka - 0.3.9-1Jiri Popelka - 0.3.8-1Jiri Popelka - 0.3.7-1Jiri Popelka - 0.3.6.2-1Jiri Popelka - 0.3.6.1-1Jiri Popelka - 0.3.6-1Jiri Popelka - 0.3.5-1Thomas Woerner 0.3.4-1Jiri Popelka Thomas Woerner 0.3.3-2Thomas Woerner 0.3.3-1Jiri Popelka - 0.3.2-2Jiri Popelka - 0.3.2-1Jiri Popelka - 0.3.1-2Thomas Woerner 0.3.1-1Thomas Woerner 0.3.0-1Jiri Popelka - 0.2.12-5Jiri Popelka - 0.2.12-4Fedora Release Engineering - 0.2.12-3Jiri Popelka - 0.2.12-2Thomas Woerner 0.2.12-1Thomas Woerner 0.2.11-2Thomas Woerner 0.2.11-1Thomas Woerner 0.2.10-1Thomas Woerner 0.2.9-1Thomas Woerner 0.2.8-1Jiri Popelka 0.2.7-2Thomas Woerner 0.2.7-1Thomas Woerner 0.2.6-1Thomas Woerner 0.2.5-1Thomas Woerner 0.2.4-1Thomas Woerner 0.2.3-1Thomas Woerner 0.2.2-1Thomas Woerner Thomas Woerner 0.2.1-1Thomas Woerner 0.2.0-2Thomas Woerner 0.2.0-1Thomas Woerner 0.1.3-1Thomas Woerner 0.1.2-1Thomas Woerner 0.1.1-1Thomas Woerner 0.1-1- bump versions on old config package obsoletes (f21 is on 0.3.14 now)- Require python3-gobject-base for fedora >= 23 and rhel >= 8 (RHBZ#1242076) - Fix rhel defines: No python3 for rhel-7- Fixed 'pid_file' referenced before assignment (RHBZ#1233232)- reunification of the firewalld spec files for all Fedora releases - firewalld.spec: - fixed requirements for -applet and -config - man pages: - adapted firewall-applet man page to new version - firewall-applet: - Only honour active connections for zone changes - Change QSettings path and file names - firewall-config: - Only honour active connections for zone changes in the “Change Zones of Connections” menu - Translations: - updated translations - marked translations for “Connections” for review- Fix issue with missing polkit policy when installing firewalld on Cloud Edition.- fix dependencies for -applet and -config: use_python3 is the proper switch not with_python3 (RHBZ#1232493)- firewall-applet - do not use isSystemTrayAvailable check to fix KDE5 startup - dropped gtk applet remain: org.fedoraproject.FirewallApplet.gschema.xml- renamed python2-firewall to python-firewall - fixed requirements for GUI parts with Python3 - dropped upstream merged python3 patch - firewalld: - print real zone names in error messages - iptables 1.4.21 does not accept limits of 1/day, minimum is 2/day now - rate limit fix for rich rules - fix readdition of removed permanent direct settings - adaption of the polkit domains to use PK_ACTION_DIRECT_INFO - fixed two minor Python3 issues in firewall.core.io.direct - fixed use of fallback configuration values - fixed use without firewalld.conf - firewalld main restructureization - IPv6_rpfilter now also available as a property on D-Bus in the config interface - fixed wait option use for ipXtables - added --concurrent support for ebtables - richLanguage: allow masquerading with destination - richLanguage: limit masquerading forward rule to new connections - ipXtables: No dns lookups in available_tables and _detect_wait_option - full ebtables support: start, stop, reload, panic mode, direct chains and rules - fix for reload with direct rules - fix or flaws found by landscape.io - pid file handling fixes in case of pid file removal - fix for client issue in case of a dbus NoReply error - configuration - new services: dropbox-lansync, ptp - new icmptypes: timestamp-request, timestamp-reply - man pages: - firewalld.zones(5): fixed typos - firewalld.conf(5): Fixed wrong reference to firewalld.lockdown-whitelist page - firewall-applet: - new version using Qt4 fixing several issues with the Gtk version - spec file: - enabled Python3 support: new backends python-firewall and python3-firewall - some cleanup - git: - migrated to github - translations: - migrated to zanata - build environment: - no need for autoconf-2.69, 2.68 is sufficient- Use VARIANT_ID instead of VARIANT for making decisions- Switch to using $VARIANT directly from /etc/os-release- Fix bugs with posttrans - Remove nonexistent fedora-cloud.conf symlink- Remove per-edition config files - Decide on default configuration based on /etc/os-release- use python3 bindings on fedora >=23- enable python2 and python3 bindings for fedora >= 20 and rhel >= 7 - use python3 bindings on fedora >= 22 and rhel >= 8 for firewalld, firewall-config and firewall-applet- firewalld: - ipXtables: use -w or -w2 if supported (RHBZ#1161745, RHBZ#1151067) - DROP INVALID packets (RHBZ#1169837) - don't use ipv6header for protocol matching. (RHBZ#1065565) - removeAllPassthroughs(): remove passthroughs in reverse order (RHBZ#1167100) - fix config.service.removeDestination() (RHBZ#1164584) - firewall-config: - portProtoDialog: other protocol excludes port number/range - better fix for updating zoneStore also in update_active_zones() - fix typo in menu - configuration: - new services: tinc, vdsm, mosh, iscsi-target, rsyncd - ship and install XML Schema files. (#8) - man pages: - firewalld.dbus, firewalld.direct, firewalld, firewall-cmd - spec file: - filesystem subpackage - make dirs&files in /usr/lib/ world-readable (RHBZ#915988)- firewalld: - new runtimeToPermanent and tracked passsthrough support - make permanent D-Bus interfaces more fine grained like the runtime versions (RHBZ#1127706) - richLanguage: allow using destination with forward-port - Rich_Rule.check(): action can't be used with icmp-block/forward-port/masquerade - fixed Python specific D-Bus exception (RHBZ#1132441) - firewall-cmd: - new --runtime-to-permanent to create permanent from runtime configuration - use new D-Bus methods for permanent changes - show target REJECT instead of %REJECT% (RHBZ#1058794) - --direct: make fail messages consistent (RHBZ#1141835) - firewall-config: - richRuleDialog - OK button tooltip indicates problem - use new D-Bus methods for permanent changes - show target REJECT instead of %REJECT% (RHBZ#1058794) - update "Change Zones of Connections" menu on default zone change (RHBZ#11120212) - fixed rename of zones, services and icmptypes to not create new entry (RBHZ#1131064) - configuration: - new service for Squid HTTP proxy server - new service for Kerberos admin server - new services for syslog and syslog-tls - new services for SNMP and SNMP traps - add Keywords to .desktop to improve software searchability - docs: - updated translations - firewalld.richlanguage: improvements suggested by Rufe Glick - firewalld.dbus: various improvements - firewalld.zone: better description of Limit tag - mention new homepage everywhere- Quiet systemctl if cups-browsed.service is not installed- add few Requires to spec (RHBZ#1133167)- firewalld: - improve error messages - check built-in chains in direct chain handling functions (RHBZ#1120619) - dbus_to_python() check whether input is of expected type (RHBZ#1122018) - handle negative timeout values (RHBZ#1124476) - warn when Command/Uid/Use/Context already in lockdown whitelist (RHBZ#1126405) - make --lockdown-{on,off} work again (RHBZ#1111573) - firewall-cmd: - --timeout now accepts time units (RHBZ#994044) - firewall-config: - show active (not default) zones in bold (RHBZ#993655) - configuration: - remove ipp-client service from all zones (RHBZ#1105639). - fallbacks for missing values in firewalld.conf - create missing dirs under /etc if needed - add -Es to python command in lockdown-whitelist.xml (RHBZ#1099065) - docs: - 'direct' methods concern only chains/rules added via 'direct' (RHBZ#1120619) - --remove-[interface/source] don't need a zone to be specified (RHBZ#1125851) - various fixes in firewalld.zone(5), firewalld.dbus(5), firewalld.direct(5) - others: - rpm macros for easier packaging of e.g. services- Fixed wrong default zone names for server and workstation (RHBZ#1120296)- renamed fedora specific zones to FedoraServer and FedoraWorkstation for zone name limitations (length and allowed chars)- New support for Fedora per-product configuration settings for Fedora.next https://fedoraproject.org/wiki/Per-Product_Configuration_Packaging_Draft - Added Fedora server zone (RHBZ#1110711) - Added Fedora workstation zone(RHBZ#1113775)- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- new services: freeipa-*, puppermaster, amanda-k5, synergy, xmpp-*, tor, privoxy, sane - do not use at_console in D-Bus policies (RHBZ#1094745) - apply all rich rules for non-default targets - AppData file (RHBZ#1094754) - separate Polkit actions for desktop & server (RHBZ#1091068) - sanitize missing ip6t_rpfilter (RHBZ#1074427) - firewall/core/io/*: few improvements (RHBZ#1065738) - no load failed error for absent direct.xml file - new DBUS_INTERFACE.getZoneSettings to get all run-time zone settings - fixed creation and deletion of zones, services and icmptypes over D-Bus signals - FirewallClientZoneSettings: Set proper default target - if Python2 then encode strings from sax parser (RHBZ#1059104, RHBZ#1058853) - firewall-cmd: - don't colour output of query commands (RHBZ#1097841) - use "default" instead of {chain}_{zone} (RHBZ#1075675) - New --get-target and --set-target - Create and remove permanent zones, services and icmptypes - firewall-config: - Adding services and icmptypes resulted in duplicates in UI - Use left button menu of -applet in Option menu - firewall-offline-cmd: same functionality as 'firewall-cmd --permanent' - firewall-applet: ZoneConnectionEditor was missing the Default Zone entry - bash-completion: getting zones/services/icmps is different with/without --permanent - firewalld.zone(5): removed superfluous slash (RHBZ#1091575) - updated translations- Fixed persistent port forwarding (RHBZ#1056154) - Stop default zone rules being applied to all zones (RHBZ#1057875) - Enforce trust, block and drop zones in the filter table only (RHBZ#1055190) - Allow RAs prior to applying IPv6_rpfilter (RHBZ#1058505) - Fix writing of rule.audit in zone_writer()- fix regression introduced in 0.3.9 (RHBZ#1053932)- fix regressions introduced in 0.3.9 (RHBZ#1054068, RHBZ#1054120)- translation updates - New IPv6_rpfilter setting to enable source address validation (RHBZ#847707) - Do not mix original and customized zones in case of target changes, apply only used zones - firewall-cmd: fix --*_lockdown_whitelist_uid to work with uid 0 - Don't show main window maximized. (RHBZ#1046811) - Use rmmod instead of 'modprobe -r' (RHBZ#1031102) - Deprecate 'enabled' attribute of 'masquerade' element - firewall-config: new zone was added twice to the list - firewalld.dbus(5) - Enable python shebang fix again - firewall/client: handle_exceptions: Use loop in decorator - firewall-offline-cmd: Do not mask firewalld service with disabled option - firewall-config: richRuleDialogActionRejectType Entry -> ComboBox - Rich_Rule: fix parsing of reject element (RHBZ#1027373) - Show combined zones in permanent configuration (RHBZ#1002016) - firewall-cmd(1): document exit code 2 and colored output (RHBZ#1028507) - firewall-config: fix RHBZ#1028853- fix memory leaks - New option --debug-gc - Python3 compatibility - Better non-ascii support - several firewall-config & firewall-applet fixes - New --remove-rules commands for firewall-cmd and removeRules methods for D-Bus - Fixed FirewallDirect.get_rules to return proper list - Fixed LastUpdatedOrderedDict.keys() - Enable rich rule usage in trusted zone (RHBZ#994144) - New error codes: INVALID_CONTEXT, INVALID_COMMAND, INVALID_USER and INVALID_UID- Don't fail on missing ip[6]tables/ebtables table. (RHBZ#967376) - bash-completion: --permanent --direct options - firewall/core/fw.py: fix checking for iptables & ip6tables (RHBZ#1017087) - firewall-cmd: use client's exception_handler instead of catching exceptions ourselves - FirewallClientZoneSettings: fix {add|remove|query}RichRule() - Extend amanda-client service with 10080/tcp (RHBZ#1016867) - Simplify Rich_Rule()_lexer() by using functions.splitArgs() - Fix encoding problems in exception handling (RHBZ#1015941)- firewall-offline-cmd: --forward-port 'toaddr' is optional (RHBZ#1014958) - firewall-cmd: fix variable name (RHBZ#1015011)- remove superfluous po files from archive- firewalld.richlanguage.xml: correct log levels (RHBZ#993740) - firewall-config: Make sure that all zone settings are updated properly on firewalld restart - Rich_Limit: Allow long representation for duration (RHBZ#994103 - firewall-config: Show "Changes applied." after changes (RHBZ#993643) - Use own connection dialog to change zones for NM connections - Rename service cluster-suite to high-availability (RHBZ#885257) - Permanent direct support for firewall-config and firewall-cmd - Try to avoid file descriptor leaking (RHBZ#951900) - New functions to split and join args properly (honoring quotes) - firewall-cmd(1): 2 simple examples - Better IPv6 NAT checking. - Ship firewalld.direct(5).- Only use one PK action for configuration (RHBZ#994729) - firewall-cmd: indicate non-zero exit code with red color - rich-rule: enable to have log without prefix & log_level & limit - log-level warn/err -> warning/error (RHBZ#1009436) - Use policy DROP while reloading, do not reset policy in restart twice - Add _direct chains to all table and chain combinations - documentation improvements - New firewalld.direct(5) man page docbook source - tests/firewall-cmd_test.sh: make rich language tests work - Rich_Rule._import_from_string(): improve error messages (RHBZ#994150) - direct.passthrough wasn't always matching out_signature (RHBZ#967800) - firewall-config: twist ICMP Type IP address family logic. - firewall-config: port-forwarding/masquerading dialog (RHBZ#993658) - firewall-offline-cmd: New --remove-service= option (BZ#969106) - firewall-config: Options->Lockdown was not changing permanent. - firewall-config: edit line on doubleclick (RHBZ#993572) - firewall-config: System Default Zone -> Default Zone (RHBZ#993811) - New direct D-Bus interface, persistent direct rule handling, enabled passthough - src/firewall-cmd: Fixed help output to use more visual parameters - src/firewall-cmd: New usage output, no redirection to man page anymore - src/firewall/core/rich.py: Fixed forwad port destinations - src/firewall-offline-cmd: Early enable/disable handling now with mask/unmask - doc/xml/firewalld.zone.xml: Added more information about masquerade use - Prefix to log message is optional (RHBZ#998079) - firewall-cmd: fix --permanent --change-interface (RHBZ#997974) - Sort zones/interfaces/service/icmptypes on output. - wbem-https service (RHBZ#996668) - applet&config: add support for KDE NetworkManager connection editor - firewall/core/fw_config.py: New method update_lockdown_whitelist - Added missing file watcher for lockdown whitelist in config D-Bus interface - firewall/core/watcher: New add_watch_file for lockdown-whitelist and direct - Make use of IPv6 NAT conditional, based on kernel number (RHBZ#967376)- several rich rule check enhancements and fixes - firewall-cmd: direct options - check ipv4|ipv6|eb (RHBZ#970505) - firewall-cmd(1): improve description of direct options (RHBZ#970509) - several firewall-applet enhancements and fixes - New README - several doc and man page fixes - Service definitions for PCP daemons (RHBZ#972262) - bash-completion: add lockdown and rich language options - firewall-cmd: add --permanent --list-all[-zones] - firewall-cmd: new -q/--quiet option - firewall-cmd: warn when default zone not active (RHBZ#971843) - firewall-cmd: check priority in --add-rule (RHBZ#914955) - add dhcpv6 (for server) service (RHBZ#917866) - firewall-cmd: add --permanent --get-zone-of-interface/source --change-interface/source - firewall-cmd: print result (yes/no) of all --query-* commands - move permanent-getZoneOf{Interface|Source} from firewall-cmd to server - Check Interfaces/sources when updating permanent zone settings. - FirewallDConfig: getZoneOfInterface/Source can actually return more zones - Fixed toaddr check in forward port to only allow single address, no range - firewall-cmd: various output improvements - fw_zone: use check_single_address from firewall.functions - getZoneOfInterface/Source does not need to throw exception - firewall.functions: Use socket.inet_pton in checkIP, fixed checkIP*nMask - firewall.core.io.service: Properly check port/proto and destination address - Install applet desktop file into /etc/xdg/autostart - Fixed option problem with rich rule destinations (RHBZ#979804) - Better exception creation in dbus_handle_exceptions() decorator (RHBZ#979790) - Updated firewall-offline-cmd - Use priority in add, remove, query and list of direct rules (RHBZ#979509) - New documentation (man pages are created from docbook sources) - firewall/core/io/direct.py: use prirority for rule methods, new get_all_ methods - direct: pass priority also to client.py and firewall-cmd - applet: New blink and blink-count settings - firewall.functions: New function ppid_of_pid - applet: Check for gnome3 and fix it, use new settings, new size-changed cb - firewall-offline-cmd: Fix use of systemctl in chroot - firewall-config: use string.ascii_letters instead of string.letters - dbus_to_python(): handle non-ascii chars in dbus.String. - Modernize old syntax constructions. - dict.keys() in Python 3 returns a "view" instead of list - Use gettext.install() to install _() in builtins namespace. - Allow non-ascii chars in 'short' and 'description' - README: More information for "Working With The Source Repository" - Build environment fixes - firewalld.spec: Added missing checks for rhel > 6 for pygobject3-base - firewall-applet: New setting show-inactive - Don't stop on reload when lockdown already enabled (RHBZ#987403) - firewall-cmd: --lockdown-on/off did not touch firewalld.conf - FirewallApplet.gschema.xml: Dropped unused sender-info setting - doc/firewall-applet.xml: Added information about gsettings - several debug and log message fixes - Add chain for sources so they can be checked before interfaces (RHBZ#903222) - Add dhcp and proxy-dhcp services (RHBZ#986947) - io/Zone(): don't error on deprecated family attr of source elem - Limit length of zone file name (to 12 chars) due to Netfilter internals. - It was not possible to overload a zone with defined source(s). - DEFAULT_ZONE_TARGET: {chain}_ZONE_{zone} -> {chain}_{zone} - New runtime getSettings for services and icmptypes, fixed policies callbacks - functions: New functions checkUser, checkUid and checkCommand - src/firewall/client: Fixed lockdown-whitelist-updated signal handling - firewall-cmd(1): move firewalld.richlanguage(5) reference in --*-rich-rule - Rich rule service: Only add modules for accept action - firewall/core/rich: Several fixes and enhanced checks - Fixed reload of direct rules - firewall/client: New functions to set and get the exception handler - firewall-config: New and enhanced UI to handle lockdown and rich rules - zone's immutable attribute is redundant - Do not allow to set settings in config for immutable zones. - Ignore deprecated 'immutable' attribute in zone files. - Eviscerate 'immutable' completely. - FirewallDirect.query_rule(): fix it - permanent direct: activate firewall.core.io.direct:Direct reader - core/io/*: simplify getting of character data - FirewallDirect.set_config(): allow reloading- Remove migrating to a systemd unit file from a SysV initscript - Remove pointless "ExclusiveOS" tag- Fixed rich rule check for use in D-Bus- new service files - relicensed logger.py under GPLv2+ - firewall-config: sometimes we don't want to use client's exception handler - When removing Service/IcmpType remove it from zones too (RHBZ#958401) - firewall-config: work-around masquerade_check_cb() being called more times - Zone(IO): add interfaces/sources to D-Bus signature - Added missing UNKNOWN_SOURCE error code - fw_zone.check_source: Raise INVALID_FAMILY if family is invalid - New changeZoneOfInterface method, marked changeZone as deprecated - Fixed firewall-cmd man page entry for --panic-on - firewall-applet: Fixed possible problems of unescaped strings used for markup - New support to bind zones to source addresses and ranges (D-BUS, cmd, applet - Cleanup of unused variables in FirewallD.start - New firewall/fw_types.py with LastUpdatedOrderedDict - direct.chains, direct.rules: Using LastUpdatedOrderedDict - Support splitted zone files - New reader and writer for stored direct chains and rules - LockdownWhitelist: fix write(), add get_commands/uids/users/contexts() - fix service_writer() and icmptype_writer() to put newline at end of file - firewall-cmd: fix --list-sources - No need to specify whether source address family is IPv4 or IPv6 - add getZoneOfSource() to D-Bus interface - Add tests and bash-completion for the new "source" operations - Convert all input args in D-Bus methods - setDefaultZone() was calling accessCheck() *after* the action - New uniqify() function to remove duplicates from list whilst preserving order - Zone.combine() merge also services and ports - config/applet: silence DBusException during start when FirewallD is not running (RHBZ#966518) - firewall-applet: more fixes to make the address sources family agnostic - Better defaults for lockdown white list - Use auth_admin_keep for allow_any and allow_inactive also - New D-Bus API for lockdown policies - Use IPv4, IPv6 and BRIDGE for FirewallD properties - Use rich rule action as audit type - Prototype of string-only D-Bus interface for rich language - Fixed wrongly merged source family check in firewall/core/io/zone.py - handle_cmr: report errors, cleanup modules in error case only, mark handling - Use audit type from rule action, fixed rule output - Fixed lockdown whitelist D-Bus handling method names - New rich rule handling in runtime D-Bus interface - Added interface, source and rich rule handling (runtime and permanent) - Fixed dbus_obj in FirewallClientConfigPolicies, added queryLockdown - Write changes in setLockdownWhitelist - Fixed typo in policies log message in method calls - firewall-cmd: Added rich rule, lockdown and lockdown whitelist handling - Don't check access in query/getLockdownWhitelist*() - firewall-cmd: Also output masquerade flag in --list-all - firewall-cmd: argparse is able to convert argument to desired type itself - firewall-cmd_test.sh: tests for permanent interfaces/sources and lockdown whitelist - Makefile.am: add missing files - firewall-cmd_test.sh: tests for rich rules - Added lockdown, source, interface and rich rule docs to firewall-cmd - Do not masquerade lo if masquerade is enabled in the default zone (RHBZ#904098) - Use in metavar for firewall-cmd parser- removed unintentional en_US.po from tarball- Fix signal handling for SIGTERM - Additional service files (RHBZ#914859) - Updated po files - s/persistent/permanent/ (Trac Ticket #7) - Better behaviour when running without valid DISPLAY (RHBZ#955414) - client.handle_exceptions(): do not loop forever - Set Zone.defaults in zone_reader (RHBZ#951747) - client: do not pass the dbus exception name to handler - IO_Object_XMLGenerator: make it work with Python 2.7.4 (RHBZ#951741) - firewall-cmd: do not use deprecated BaseException.message - client.py: fix handle_exceptions() (RHBZ#951314) - firewall-config: check zone/service/icmptype name (RHBZ#947820) - Allow 3121/tcp (pacemaker_remote) in cluster-suite service. (RHBZ#885257) - firewall-applet: fix default zone hangling in 'shields-up' (RHBZ#947230) - FirewallError.get_code(): check for unknown error- Make permanenent changes work with Python 2.7.4 (RHBZ#951741)- Use explicit file lists for make dist - New rich rule validation check code - New global check_port and check_address functions - Allow source white and black listing with the rich rule - Fix error handling in case of unsupported family in rich rule - Enable ip_forwarding in masquerade and forward-port - New functions to read and write simple files using filename and content - Add --enable-sysconfig to install Fedora-specific sysconfig config file. - Add chains for security table (RHBZ#927015) - firewalld.spec: no need to specify --with-systemd-unitdir - firewalld.service: remove syslog.target and dbus.target - firewalld.service: replace hard-coded paths - Move bash-completion to new location. - Revert "Added configure for new build env" - Revert "Added Makefile.in files" - Revert "Added po/Makefile.in.in" - Revert "Added po/LINGUAS" - Revert "Added aclocal.m4" - Amend zone XML Schema- Added rich language support - Added lockdown feature - Allow to bind interfaces and sources to zones permanently - Enabled IPv6 NAT support masquerading and port/packet forwarding for IPv6 only with rich language - Handle polkit errors in client class and firewall-config - Added priority description for --direct --add-rule in firewall-cmd man page - Add XML Schemas for zones/services/icmptypes XMLs - Don't keep file descriptors open when forking - Introduce --nopid option for firewalld - New FORWARD_IN_ZONES and FORWARD_OUT_ZONES chains (RHBZ#912782) - Update cluster-suite service (RHBZ#885257) - firewall-cmd: rename --enable/disable-panic to --panic-on/off (RHBZ#874912) - Fix interaction problem of changed event of gtk combobox with polkit-kde by processing all remaining events (RHBZ#915892) - Stop default zone rules being applied to all zones (RHBZ#912782) - Firewall.start(): don't call set_default_zone() - Add wiki's URL to firewalld(1) and firewall-cmd(1) man pages - firewalld-cmd: make --state verbose (RHBZ#886484) - improve firewalld --help (RHBZ#910492) - firewall-cmd: --add/remove-* can be used multiple times (RHBZ#879834) - Continue loading zone in case of wrong service/port etc. (RHBZ#909466) - Check also services and icmptypes in Zone() (RHBZ#909466) - Increase the maximum length of the port forwarding fields from 5 to 11 in firewall-config - firewall-cmd: add usage to fail message - firewall-cmd: redefine usage to point to man page - firewall-cmd: fix visible problems with arg. parsing - Use argparse module for parsing command line options and arguments - firewall-cmd.1: better clarify where to find ACTIONs - firewall-cmd Bash completion - firewall-cmd.1: comment --zone= usage and move some options - Use zone's target only in %s_ZONES chains - default zone in firewalld.conf was set to public with every restart (#902845) - man page cleanup - code cleanup- Another fix for RHBZ#912782- Stop default zone rules being applied to all zones (RHBZ#912782)- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild- Default zone in firewalld.conf was reseted with every restart (RHBZ#902845) - Add icon cache related scriptlets for firewall-config (RHBZ#902680) - Fix typo in firewall-config (RHBZ#895812) - Fix few mistakes in firewall-cmd(1) man page- firewall-cmd: use -V instead of -v for version info (RHBZ#886477) - firewall-cmd: don't check reload()'s return value (RHBZ#886461) - actually install firewalld.zones.5 - firewall-config: treat exceptions when adding new zone/service/icmp (RHBZ#886602) - firewalld.spec: Fixed requirements of firewall-config to use gtk2 and pygobject3 - Fail gracefully when running in non X environment.(RHBZ#886551) - offline-cmd: fail gracefully when no s-c-f config - fix duplicated iptables rules (RHBZ#886515) - detect errors and duplicates in config file (RHBZ#886581) - firewall-config: don't make 'Edit Service' and 'Edit ICMP Type' insensitive - firewalld.spec: fixed requirements, require pygobject3-base - frewall-applet: Unused code cleanup - firewall-applet: several usability fixes and enhancements (RHBZ#886531) (RHBZ#886534) - firewall/server/server.py: fixed KeyboardInterrupt message (RHBZ#886558) - Moved fallback zone and minimal_mark to firewall.config.__init__ - Do not raise ZONE_ALREADY_SET in change_zone if old zone is set again (RHBZ#886432) - Make default zone default for all unset connections/interfaces (RHBZ#888288) (RHBZ#882736) - firewall-config: Use Gtk.MessageType.WARNING for warning dialog - firewall-config: Handle unknown services and icmptypes in persistent mode - firewall-config: Do not load settings more than once - firewall-config: UI cleanup and fixes (RHBZ#888242) - firewall-cmd: created alias --change-zone for --change-interface - firewall-cmd man page updates (RHBZ#806511) - Merged branch 'build-cleanups' - dropped call to autogen.sh in build stage, not needed anymore due to 'build-cleanups' merge- require pygobject3-base instead of pygobject3 (no cairo needed) (RHBZ#874378) - fixed dependencies of firewall-config to use gtk3 with pygobject3-base and not pygtk2- Fixed more _xmlplus (PyXML) incompatibilities to python xml - Several man page updates - Fixed error in addForwardPort, removeForwardPort and queryForwardPort - firewall-cmd: use already existing queryForwardPort() - Update firewall.cmd man page, use man page as firewall-cmd usage (rhbz#876394) - firewall-config: Do not force to show labels in the main toolbar - firewall-config: Dropped "Change default zone" from toolbar - firewall-config: Added menu entry to change zones of connections - firewall-applet: Zones can be changed now using nm-connection-editor (rhbz#876661) - translation updates: cs, hu, ja- tests/firewalld_config.py: tests for config.service and config.icmptype - FirewallClientConfigServiceSettings(): destinations are dict not list - service/zone/icmptype: do not write deprecated name attribute - New service ntp - firewall-config: Fixed name of about dialog - configure.in: Fixed getting of error codes - Added coding to all pyhton files - Fixed copyright years - Beautified file headers - Force use of pygobject3 in python-slip (RHBZ#874378) - Log: firewall.server.config_icmptype, firewall.server.config_service and firewall.server.config_zone: Prepend full path - Allow ":" in interface names for interface aliases - Add name argument to Updated and Renamed signal - Disable IPv4, IPv6 and EB tables if missing - for IPv4/IPv6 only environments - firewall-config.glade file cleanup - firewall-config: loadDefaults() can throw exception - Use toolbars for Add/Edit/Remove/LoadDefaults buttons for zones, services and icmp types - New vnc-server service, opens ports for displays :0 to :3 (RHBZ#877035) - firewall-cmd: Fix typo in help output, allow default zone usage for permanenent options - Translation updates: cs, fr, ja, pt_BR and zh_CN- firewall-config: some UI usability changes - firewall-cmd: New option --list-all-zones, output of --list-all changed, more option combination checks - firewall-applet: Replaced NMClient by direct DBUS calls to fix python core dumps in case of connection activates/deactivates - Use fallback 'C' locale if current locale isn't supported (RHBZ#860278) - Add interfaces to zones again after reload - firewall-cmd: use FirewallClient().connected value - firewall-cmd: --remove-interface was not working due to a typo - Do not use restorecon for new and backup files - Fixed use of properties REJECT and DROP - firewalld_test.py: check interfaces after reload - Translation updates - Renamed firewall-convert-scfw-config to firewall-offline-cmd, used by anaconda for firewall configuration (e.g. kickstart) - Fix python shebang to use -Es at installation time for bin_SCRIPTS and sbin_SCRIPTS and at all times in gtk3_chooserbutton.py - tests/firewalld_config.py: update test_zones() test case - Config interface: improve renaming of zones/services/icmp_types - Move emiting of Added signals closer to source. - FirewallClient(): config:ServiceAdded signal was wrongly mapped - Add argument 'name' to Removed signal - firewall-config: Add callbacks for config:[service|icmp]-[added|removed] - firewall-config: catch INVALID_X error when removing zone/service/icmp_type - firewall-config: remove unused code - Revert "Neutralize _xmlplus instead of conforming it" - firewall-applet: some UI usability changes - firewall-cmd: ALREADY_ENABLED, NOT_ENABLED, ZONE_ALREADY_SET are warnings- Do not apply old settings to zones after reload - FirewallClient: Added callback structure for firewalld signals - New firewall-config with full zone, service and icmptype support - Added Shields Up/Down configuration dialog to firewall-applet - Name attribute of main tag deprecated for zones, services and icmptypes, will be ignored if present - Fixed wrong references in firewalld man page - Unregister DBus interfaces after sending out the Removed signal - Use proper DBus signature in addIcmpType, addService and addZone - New builtin property for config interfaces - New test case for Config interface - spec: use new systemd-rpm macros (rhbz#850110) - More config file verifications - Lots of smaller fixes and enhancements- use new systemd-rpm macros (rhbz#850110)- Update of firewall-config - Some bug fixes- New D-BUS interface for persistent configuration - Aded support for persistent zone configuration in firewall-cmd - New Shields Up feature in firewall-applet - New requirements for python-decorator and pygobject3 - New firewall-config sub-package - New firewall-convert-scfw-config config script- Fixed traceback in firewall-cmd for failed or canceled authorization, return proper error codes, new error codes NOT_RUNNING and NOT_AUTHORIZED - Enhanced firewalld service file (RHBZ#806868) and (RHBZ#811240) - Fixed duplicates in zone after reload, enabled timed settings after reload - Removed conntrack --ctstate INVALID check from default ruleset, because it results in ICMP problems (RHBZ#806017). - Update interfaces in default zone after reload (rhbz#804814) - New man pages for firewalld(1), firewalld.conf(5), firewalld.icmptype(5), firewalld.service(5) and firewalld.zone(5), updated firewall-cmd man page (RHBZ#811257) - Fixed firewall-cmd help output - Fixed missing icon for firewall-applet (RHBZ#808759) - Added root user check for firewalld (RHBZ#767654) - Fixed requirements of firewall-applet sub package (RHBZ#808746) - Update interfaces in default zone after changing of default zone (RHBZ#804814) - Start firewalld before NetworkManager (RHBZ#811240) - Add Type=dbus and BusName to service file (RHBZ#811240)- fixed firewalld.conf save exception if no temporary file can be written to /etc/firewalld/- firewall-cmd: several changes and fixes - code cleanup - fixed icmp protocol used for ipv6 (rhbz#801182) - added and fixed some comments - properly restore zone settings, timeout is always set, check for 0 - some FirewallError exceptions were actually not raised - do not REJECT in each zone - removeInterface() don't require zone - new tests in firewall-test script - dbus_to_python() was ignoring certain values - added functions for the direct interface: chains, rules, passthrough - fixed inconsistent data after reload - some fixes for the direct interface: priority positions are bound to ipv, table and chain - added support for direct interface in firewall-cmd: - added isImmutable(zone) to zone D-Bus interface - renamed policy file - enhancements for error messages, enables output for direct.passthrough - added allow_any to firewald policies, using at leas auth_admin for policies - replaced ENABLE_FAILED, DISABLE_FAILED, ADD_FAILED and REMOVE_FAILED by COMMAND_FAILED, resorted error codes - new firewalld configuration setting CleanupOnExit - enabled polkit again, found a fix for property problem with slip.dbus.service - added dhcpv6-client to 'public' (the default) and to 'internal' zones. - fixed missing settings form zone config files in "firewall-cmd --list=all --zone=" call - added list functions for services and icmptypes, added --list=services and --list=icmptypes to firewall-cmd- enabled dhcpv6-client service for zones home and work - new dhcpv6-client service - firewall-cmd: query mode returns reversed values - new zone.changeZone(zone, interface) - moved zones, services and icmptypes to /usr/lib/firewalld, can be overloaded by files in /etc/firewalld (no overload of immutable zones block, drop, trusted) - reset MinimalMark in firewalld.cnf to default value - fixed service destination (addresses not used) - fix xmlplus to be compatible with the python xml sax parser and python 3 by adding __contains__ to xml.sax.xmlreader.AttributesImpl - use icon and glib related post, postun and posttrans scriptes for firewall - firewall-cmd: fix typo in state - firewall-cmd: fix usage() - firewall-cmd: fix interface action description in usage() - client.py: fix definition of queryInterface() - client.py: fix typo in getInterfaces() - firewalld.service: do not fork - firewall-cmd: fix bug in --list=port and --port action help message - firewall-cmd: fix bug in --list=service- moved zones, services and icmptypes to /usr/lib/firewalld, can be overloaded by files in /etc/firewalld (no overload of immutable zones block, drop, trusted)- added missing firewall.dbus_utils- added glib2-devel to build requires, needed for gsettings.m4 - added --with-system-unitdir arg to fix installaiton of system file - added glib-compile-schemas calls for postun and posttrans - added EXTRA_DIST file lists- version 0.2.0 with new FirewallD1 D-BUS interface - supports zones with a default zone - new direct interface as a replacement of the partial virt interface with additional passthrough functionality - dropped custom rules, use direct interface instead - dropped trusted interface funcionality, use trusted zone instead - using zone, service and icmptype configuration files - not using any system-config-firewall parts anymore- new version 0.1.3 - restore all firewall features for reload: panic and virt rules and chains - string fixes for firewall-cmd man page (by Jiri Popelka) - fixed firewall-cmd port list (by Jiri Popelka) - added firewall dbus client connect check to firewall-cmd (by Jiri Popelka) - translation updates: de, es, gu, it, ja, kn, ml, nl, or, pa, pl, ru, ta, uk, zh_CN- fixed package according to package review (rhbz#665395): - non executable scripts: dropped shebang - using newer GPL license file - made /etc/dbus-1/system.d/FirewallD.conf config(noreplace) - added requires(post) and (pre) for chkconfig- new version 0.1.1 - fixed source path in POTFILES* - added missing firewall_config.py.in - added misssing space for spec_ver line - using firewall_config.VARLOGFILE - added date to logging output - also log fatal and error logs to stderr and firewall_config.VARLOGFILE - make log message for active_firewalld fatal- initial package (proof of concept implementation)/bin/sh/bin/sh/bin/shfirewalld-config-cloudfirewalld-config-serverfirewalld-config-standardfirewalld-config-workstation  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~arasbgbncacsdadeeleneneseteufifrglguhihuiaitjakaknkomlmrnlorpaplptptrusksrsr@latinsvtatetrukzhzh0.3.14.2-4.fc220.3.14.2-4.fc22 0.3.150.3.150.3.150.3.15  !"#$%&'()*+,-./0123456789:;<<<=========>>>FirewallD.conffirewalldfirewalld-server.conffirewalld-standard.conffirewalld-workstation.conffirewalld.conficmptypeslockdown-whitelist.xmlserviceszonesfirewalldfirewall-cmdfirewall-offline-cmddestination-unreachable.xmlecho-reply.xmlecho-request.xmlparameter-problem.xmlredirect.xmlrouter-advertisement.xmlrouter-solicitation.xmlsource-quench.xmltime-exceeded.xmlamanda-client.xmlamanda-k5-client.xmlbacula-client.xmlbacula.xmldhcp.xmldhcpv6-client.xmldhcpv6.xmldns.xmldropbox-lansync.xmlfreeipa-ldap.xmlfreeipa-ldaps.xmlfreeipa-replication.xmlftp.xmlhigh-availability.xmlhttp.xmlhttps.xmlimaps.xmlipp-client.xmlipp.xmlipsec.xmliscsi-target.xmlkadmin.xmlkerberos.xmlkpasswd.xmlldap.xmlldaps.xmllibvirt-tls.xmllibvirt.xmlmdns.xmlmosh.xmlmountd.xmlms-wbt.xmlmysql.xmlnfs.xmlntp.xmlopenvpn.xmlpmcd.xmlpmproxy.xmlpmwebapi.xmlpmwebapis.xmlpop3s.xmlpostgresql.xmlprivoxy.xmlproxy-dhcp.xmlptp.xmlpuppetmaster.xmlradius.xmlrpc-bind.xmlrsyncd.xmlsamba-client.xmlsamba.xmlsane.xmlsmtp.xmlsquid.xmlssh.xmlsynergy.xmltelnet.xmltftp-client.xmltftp.xmltinc.xmltor-socks.xmltransmission-client.xmlvdsm.xmlvnc-server.xmlwbem-https.xmlxmpp-bosh.xmlxmpp-client.xmlxmpp-local.xmlxmpp-server.xmlicmptype.xsdservice.xsdzone.xsdFedoraServer.xmlFedoraWorkstation.xmlblock.xmldmz.xmldrop.xmlexternal.xmlhome.xmlinternal.xmlpublic.xmltrusted.xmlwork.xmlfirewalld.servicefirewalldcompletionsfirewall-cmdfirewalldCOPYINGREADMEfirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewall-cmd.1.gzfirewall-offline-cmd.1.gzfirewalld.1.gzfirewalld.conf.5.gzfirewalld.dbus.5.gzfirewalld.direct.5.gzfirewalld.icmptype.5.gzfirewalld.lockdown-whitelist.5.gzfirewalld.richlanguage.5.gzfirewalld.service.5.gzfirewalld.zone.5.gzfirewalld.zones.5.gzorg.fedoraproject.FirewallD1.desktop.policyorg.fedoraproject.FirewallD1.policyorg.fedoraproject.FirewallD1.server.policy/etc/dbus-1/system.d//etc//etc/firewalld//etc/sysconfig//usr/bin//usr/lib/firewalld/icmptypes//usr/lib/firewalld/services//usr/lib/firewalld/xmlschema//usr/lib/firewalld/zones//usr/lib/systemd/system//usr/sbin//usr/share/bash-completion//usr/share/bash-completion/completions//usr/share/doc//usr/share/doc/firewalld//usr/share/locale/ar/LC_MESSAGES//usr/share/locale/as/LC_MESSAGES//usr/share/locale/bg/LC_MESSAGES//usr/share/locale/bn_IN/LC_MESSAGES//usr/share/locale/ca/LC_MESSAGES//usr/share/locale/cs/LC_MESSAGES//usr/share/locale/da/LC_MESSAGES//usr/share/locale/de/LC_MESSAGES//usr/share/locale/el/LC_MESSAGES//usr/share/locale/en_GB/LC_MESSAGES//usr/share/locale/en_US/LC_MESSAGES//usr/share/locale/es/LC_MESSAGES//usr/share/locale/et/LC_MESSAGES//usr/share/locale/eu/LC_MESSAGES//usr/share/locale/fi/LC_MESSAGES//usr/share/locale/fr/LC_MESSAGES//usr/share/locale/gl/LC_MESSAGES//usr/share/locale/gu/LC_MESSAGES//usr/share/locale/hi/LC_MESSAGES//usr/share/locale/hu/LC_MESSAGES//usr/share/locale/ia/LC_MESSAGES//usr/share/locale/it/LC_MESSAGES//usr/share/locale/ja/LC_MESSAGES//usr/share/locale/ka/LC_MESSAGES//usr/share/locale/kn/LC_MESSAGES//usr/share/locale/ko/LC_MESSAGES//usr/share/locale/ml/LC_MESSAGES//usr/share/locale/mr/LC_MESSAGES//usr/share/locale/nl/LC_MESSAGES//usr/share/locale/or/LC_MESSAGES//usr/share/locale/pa/LC_MESSAGES//usr/share/locale/pl/LC_MESSAGES//usr/share/locale/pt/LC_MESSAGES//usr/share/locale/pt_BR/LC_MESSAGES//usr/share/locale/ru/LC_MESSAGES//usr/share/locale/sk/LC_MESSAGES//usr/share/locale/sr/LC_MESSAGES//usr/share/locale/sr@latin/LC_MESSAGES//usr/share/locale/sv/LC_MESSAGES//usr/share/locale/ta/LC_MESSAGES//usr/share/locale/te/LC_MESSAGES//usr/share/locale/tr/LC_MESSAGES//usr/share/locale/uk/LC_MESSAGES//usr/share/locale/zh_CN/LC_MESSAGES//usr/share/locale/zh_TW/LC_MESSAGES//usr/share/man/man1//usr/share/man/man5//usr/share/polkit-1/actions/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=genericdrpmxz2noarch-redhat-linux-gnuXML document textdirectoryASCII textcannot open `/builddir/build/BUILDROOT/firewalld-0.3.14.2-4.fc22.noarch/etc/firewalld/firewalld.conf' (No such file or directory)Python script, ASCII text executabletroff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)troff or preprocessor input, UTF-8 Unicode text, with very long lines (gzip compressed data, max compression, from Unix)cannot open `/builddir/build/BUILDROOT/firewalld-0.3.14.2-4.fc22.noarch/usr/share/polkit-1/actions/org.fedoraproject.FirewallD1.policy' (No such file or directory)RRR# If we don't yet have a symlink or existing file for firewalld.conf, # create it. Note: this will intentionally reset the policykit policy # at the same time, so they are in sync. # Import /etc/os-release to get the variant definition . /etc/os-release || : if [ ! -e /etc/firewalld/firewalld.conf ]; then case "$VARIANT_ID" in server) ln -sf firewalld-server.conf /etc/firewalld/firewalld.conf || : ;; workstation) ln -sf firewalld-workstation.conf /etc/firewalld/firewalld.conf || : ;; *) ln -sf firewalld-standard.conf /etc/firewalld/firewalld.conf ;; esac fi if [ ! -e /usr/share/polkit-1/actions/org.fedoraproject.FirewallD1.policy ]; then case "$VARIANT_ID" in workstation) ln -sf org.fedoraproject.FirewallD1.desktop.policy /usr/share/polkit-1/actions/org.fedoraproject.FirewallD1.policy || : ;; *) # For all other editions, we'll use the Server polkit policy ln -sf org.fedoraproject.FirewallD1.server.policy /usr/share/polkit-1/actions/org.fedoraproject.FirewallD1.policy || : esac fi/bin/sh?7zXZ !#,,L ]"k%r+ӅW.Kwm4xYSVF&o:K-V٭@̉*`좁r@[G%(g@*2&v_]; X Zq?5Pxl%ތ6꽯|$9y:V?ߙdXvE„x/Hp z'oICI@&'@ TjO 䂺0<[*hT!`!-N ի%=5_vkeuC(ׇ/{Qft(& d ɹqDN IG =Vuw!pe,S2tPNέ 1tiUR3w Pb󆊁}^*-E$Hy V'RIChRA/͐k^ >zSnz@bYgM۾wW|3w4WFs$i! 7| a^n$&K0ձzb24O2z Bi5M[y{y6/8B " &69tB%ʒ t;DݺGmͨlc3^_v&v2r>YI+M .+}nގ-u. r -pf䗷zԥlH> z<-jT?,\`X}~atRBܝdf.v+Eӥ6!eHMjݩEk` <}}Zɾ#2A9yFoF>ݽhprbq.F\v JthHFTg/a6Zy6MGډ5 C=ڎYDԋnSafٮQU^,yLkURVĦ+06u{@b,%vo+/q_›Bڣ1ȊԚm+vjVBOYeCD9he12^)>No'Φ<熼r28۴^Sp. XAUP3IS#Im/FwN1ÜXJ<^: 2#?{o^Yu 6[04 _Gkvu5]498,1Uv|%Ih4eʁwg; }~/&?B̫EJYr˰K0Rd\]7K7x 7YTBͼ'l԰6u+HcYɁ= Ҝpao'LL}]]^~i輛XZú2eЄE8oKc<(^|֢n֘Jp9Q2TތM!=@d.T1L`3 (OV ciD ֵ4.Eakuq^xsڒffC1[s-TBG :hcP4S@9ր5޸Qa%/x^<3ۄ26i-wv?ҚVE w(a~#➙&C2o9eTJ+dI[.:*JCTh-Ipв4ŕsnȦ}3#cov4$ &p1bd+2|=^+a$W\|hX`:yװ H wP`XG/u*x/<m{ 3