python3-firewall-0.5.5-lp150.2.22.2<>,0\/=„s &)r:JeqH'pUX(K`a#6](\Bׇ~b> u"yE^ᎎyυy5bߓpgS9slq1X+Zpk_mF2o*I˜WMmc`Gs]( >ā`h95@ޤg-}a{[ )\.4+=c_ t>SdM9@l/e '\p^%,XNp>>?d & Elpx|  zz z z z #>z #z%z(z*d*z,t,,-(-8.09.0:20FWGlzHTzI<zXY\z]z^ b;cdve{f~luzv|wzxzyzCpython3-firewall0.5.5lp150.2.22.2Python3 bindings for FirewallDThe python3 bindings for firewalld.\lamb57popenSUSE Leap 15.0openSUSEGPL-2.0-or-laterhttp://bugs.opensuse.orgProductivity/Networking/Securityhttp://www.firewalld.orglinuxnoarch_tA=y4 lW5 H l_]Ebs4 $wU o8!;J1Z G "i[)  $ gY#D$ <.O @)P+1%Q`=l*) ZK/R,1:.XKb$yuQ JaB_1y)2Ivv qD:SGh FA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤\f\A\g\f\f\f\g\g\g\g\A\A\f\A\f\f\f\A\f\A\g\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\g\g\g\g\g\g\g\g\g\g\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\g\A\g\g\g\g\g\g\g\g\g\g\g\g\g\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\A\g\A\g\f\g\g\g\g\g\g\g\g\g\A\A\A\A\A\A\A\A\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.5.5-lp150.2.22.2.src.rpmpython3-firewall@     @@@@dbus-1-python3python(abi)python3-decoratorpython3-gobjectpython3-slip-dbusrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)typelib(GLib)typelib(GObject)typelib(Gio)typelib(NM)3.63.0.4-14.6.0-14.0.4-14.0-15.2-11.04.14.1\A[0[Ѱ@[$@[t[[v[h8@[?Y[Zz@Z3@Z̧@ZZZZZs@Z;@Z@ZOZ@Zr@Z }Z ,@ZY6@XXXEVX)@X2@WiW@W{@WrfWj}WXWM|W,@W#LWV޾VՄ@V2V@V@VHMichał Rostecki Marketa Calabkova Markos Chandras Markos Chandras Markos Chandras Markos Chandras mchandras@suse.demchandras@suse.demchandras@suse.desbrabec@suse.commchandras@suse.desbrabec@suse.comsbrabec@suse.commchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dedimstar@opensuse.orgmchandras@suse.derbrown@suse.commpluskal@suse.commchandras@suse.demchandras@suse.dempluskal@suse.commchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dejengelh@inai.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dejslaby@suse.commchandras@suse.de- Add upstream patch to fix the error in --runtime-to-permanent option about 'settings' variable being referenced before assignment. This error occurs only when NetworkManager is not used. (bsc#1122151) * 0001-firewalld-fix-runtime-to-permanent-if-NM-not-in-use.patch- Import SUSE translations (boo#1108832) * added firewalld-0.5.5-po-20181105.tar.xz- Add upstream patch to fix a python stacktrace when getting the zone for a NetworkManager connection (bsc#1106319) * 0001-firewall-core-fw_nm-nm_get_zone_of_connection-should.patch- Add adapted upstream patch to make --reload/--complete-reload forget the runtime configuration and always load the permanent one (bsc#1112008) * 0001-firewall-core-Always-reload-the-permanent-configurat.patch- Add upstream patch to mark more strings as translatable (bsc#1096542) * 0001-Fix-translating-labels-392.patch - Add upstream patches to fix NetworkManager integration (bsc#1109074) * 0001-fw_nm-Make-nm_get_zone_of_connection-only-check-perm.patch * 0002-firewall-cmd-On-getZoneOfInterface-only-ask-NM-for-p.patch * 0003-firewall-cmd-For-non-permanent-interface-changes-don.patch * 0004-fw_nm-New-function-to-get-all-interfaces-from-NM.patch * 0005-fw_nm-Add-nm_get_interfaces_in_zone.patch * 0006-firewall-cmd-Ask-NM-when-listing-permanent-interface.patch * 0007-firewall-cmd-Allow-passing-extra-interfaces-to-print.patch - Add upstream patch to fix ifcfg ZONE attribute on permanent firewall changes (bsc#1109153) * 0001-ifcfg-Modify-ZONE-on-permanent-config-changes.patch- Update to 0.5.5 (bsc#1108420) * update translations * firewall/core/fw_nm: nm_get_zone_of_connection should return None or empty string instead of False * fw: If direct rules fail to apply add a "Direct" label to error msg * fw: if startup fails on reload, reapply non-perm config that survives reload - spec-cleaner fixes- Update to 0.5.4 (bsc#1105170) * update translations * fw: if failure occurs during startup set state to FAILED * fw_direct: avoid log for untracked passthrough queries * firewall-config: fix some untranslated strings * Rich Rule Masquerade inverted source-destination in Forward Chain * don't forward interface to zone requests to NM for generated interfaces * firewall-cmd: add --check-config option * firewall-offline-cmd: add --check-config option * ipset: check type when parsing ipset definition * firewall-config: Add ipv6-icmp to the protocol dropdown box * core: logger: Remove world-readable bit from logfile * IPv6 rpfilter: explicitly allow neighbor solicitation - Remove patches that have made it upstream: * 0001-firewall-config-fix-some-untranslated-strings.patch * 0001-firewall-config-Add-ipv6-icmp-to-the-protocol-dropdo.patch * 0001-core-logger-Remove-world-readable-bit-from-logfile-3.patch * firewalld-0.5.3-po-20180417.tar.xz- Mark more strings as translatable when creating rich rules (bsc#1096542) * 0001-firewall-config-fix-some-untranslated-strings.patch- Backport the following upstream fixes: * Add missig ipv6-icmp protocol to UI drop-down list (bsc#1099698) - 0001-firewall-config-Add-ipv6-icmp-to-the-protocol-dropdo.patch * Drop global read permissions from the log file (bsc#1098986) - 0001-core-logger-Remove-world-readable-bit-from-logfile-3.patch- Merge SUSE translations to version 0.5.3, fix typos (boo#1094051, add firewalld-0.5.3-po-20180417.tar.xz, remove firewalld-po-20180417.tar.xz).- Update to 0.5.3 (bsc#1093120) * tests/regression: add test for ipset with timeout * ipset: allow adding entries to ipsets with timeout * translations: update * helpers: load helper module explicitly if no port given * helpers: nf_conntrack_proto-* helpers needs name cropped * config/Makefile: correct name of proto-gre helper * tests/regression: test helper nf_conntrack_proto_gre (#263) * functions: get_nf_nat_helpers() should look in other directories too * functions: Allow nf_conntrack_proto_* helpers * services: Add GRE * helpers: Add proto-gre * tests/regression: add test to verify ICMP block in forward chain * ipXtables: fix ICMP block not being present in FORWARD chain- Translations update to version 20180417 (bsc#1081623): * Minor fixes of ar, ko, nl.- Translations update (bsc#1081623).- Backport upstream patches to add additional services (bsc#1082033) * firewalld-add-additional-services.patch- Update to 0.5.2 * fix rule deduplication causing accidental removal of rules * log failure to parse direct rules xml as an error * firewall-config: Break infinite loop when firewalld is not running (bsc#1082470, bsc#1085205) * fix set-log-denied not taking effect * po: update translations - Remove obsolete patches which are now upstream * 0001-src-firewall-config-Fix-default-value-for-dialog-but.patch * 0002-src-firewall-config-Break-infinite-loop-when-firewal.patch- Update to 0.5.1 (bsc#1084026) * ipXtables: fix iptables-restore wait option detection * python3: use "foo in dict" not dict.has_key(foo) * Fix potential python3 keys() incompatibility in watcher * Fixed python3 compatibility * ebtables: fix missing default value to set_rule() * fw_zone: fix invalid reference to __icmp_block_inversion * zones: Correct and defer check_name for combined zones * firewallctl: mark deprecated (gh#firewalld/firewalld##261) * Add nmea-0183 service * Add sycthing-gui service * Add syncthing service * Adding FirewallD jenkins service (gh#firewalld/firewalld#256) * services/high-availability: Add port 9929 * Fix and improve firewalld-sysctls.conf * firewalld: also reload dbus config interface for global options * Add MongoDB service definition * src: firewall: Add support for SUSE ifcfg scripts * Add UPnP client service * firewalld: Allow specifying log file location * firewalld/firewall-offline-cmd: Allow setting system config directories - Drop obsolete patch * 0001-suse-ifcfg-files.patch - Drop tests installation- Add upstream patches to fix endless loop in firewall-config when firewalld is not running (bsc#1082470) * 0001-src-firewall-config-Fix-default-value-for-dialog-but.patch * 0002-src-firewall-config-Break-infinite-loop-when-firewal.patch- Remove high-availability service. SUSE HA uses the cluster service provided by the yast2-cluster package (bsc#1078223)- Introduce new python3-firewall and firewall-macros subpackages. The first one contains the firewalld python3 bindings and the second one contains the RPM macros for firewalld.- Replace dbus-1-python requires with dbus-1-python3: since firewalld was migrated to python3, we also have to require the python3 dependencies (boo#1070310).- Add missing python3-gobject-Gdk dependency (boo#1069952)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Make sure to use python3 everywhere (boo#1068778)- Add combined upstream patch to support SUSE ifcfg network files. * 0001-suse-ifcfg-files.patch (gh#firewalld/firewalld#262, fate#323460)- Update to version 0.4.4.6 * firewall.core.fw_config: Fix check for icmp builtin name * config.services: docker-swarm: fix incorrect attribute * xmlschema/service.xsd: Fix protocol looking for name instead of value * Add docker swarm service (gh#firewalld/firewalld#230) * Adding FirewallD redis service (gh#firewalld/firewalld#248) * Adding firewalld zabbix server and agent services (gh#firewalld/firewalld#221) * firewall-offline-cmd: Don't require root for help output * doc: firewall-cmd: Document --query-* options return codes * firewall-cmd: Use colors only if output is a TTY * core: Log unsupported ICMP types as informational only * add bgp service to predefined services edit to config/Makefile.am * Add git service * Add kprop service * minidlna definitions (gh#firewalld/firewalld#236) * SpiderOak ONE listens on port 21327 and 21328 * autogen.sh: Allow skipping configure via NOCONFIGURE env var * Add missing ports to RH-Satellite-6 service * Reload nf_conntrack sysctls after the module is loaded * Add NFSv3 service. * config/Makefile.am: Add murmur service (a95eed1) * add new service IRC * firewall.core.prog: Simplify runProg output: Combine stderr and stdout * firewall.core.fw: Fix possible dict size change in for loop * firewall.core.fw: Use new firewalld git repo in firewalld organization * config/firewall-config.appdata.xml.in: Use new firewalld git repo in firewalld organization * firewall.core.fw_zone: Rich-rule ICMP type: Error only for conflicting family * firewall.core.rich: Add checks for Rich_Source validation * Handle also IPv6 with the zone masquerade flag * Add IPv6 support for forward-ports in zones * firewall.command: Enable parse_forward_port to work with IPv6 adresses * firewall.core.fw_zone: Fix IPv6 address in rich rule forward ports * add Murmur (Mumble server) service - spec file fixes to avoid rpmlint warnings about duplicate files.- Switch to python3 - Run spec cleaner - Move autogen to build section - Add systemd requirements- Update to version 0.4.4.5 * firewall-offline-cmd: Fix --remove-service-from-zone option (rh#1438127) * Support sctp and dccp in ports, source-ports, forward-ports, helpers and rich rules * firewall-cmd: Fix --{set,get}-{short,description} for zone * firewall.core.ipXtables: Use new wait option for restore commands if available * Adding ovirt-vmconsole service file * Adding oVirt storage-console service. * Adding ctdb service file. * Adding service file for nrpe. * Rename extension for policy choices (server and desktop) to .policy.choice (rh#1449754) * D-Bus interfaces: Fix GetAll for interfaces without properties (rh#1452017) * firewall.core.fw_config: Fix wrong variable use in repr output * firewall.core.fw_icmptype: Add missing import for copy * firewall.core.fw_test: Fix wrong format string in repr * firewall.core.io.zone: Fix getattr use on super(Zone) * firewall.functions: New function get_nf_nat_helpers * firewall.core.fw: Get NAT helpers and store them internally. * firewall.core.fw_zone: Load NAT helpers with conntrack helpers * firewalld.dbus: Add missing properties nf_conntrach_helper_setting and nf_conntrack_helpers * firewall.server.firewalld: New property for NAT helpers supported by the kernel- Update to version 0.4.4.4 * Drop references to fedorahosted.org from spec file and Makefile.am * firewall-config: Show invalid ipset type in the ipset dialog in the bad label * firewall.core.fw: Show icmptypes and ipsets with type errors in permanent env * firewall.server.firewalld: Provide information about the supported icmp types * firewall.core.fw_icmptype: Add ICMP type only if the type is supported * firewall.core.fw: New attributes ip{4,6}tables_supported_icmp_types * firewall.core.ipXtables: New method supported_icmp_types * firewall-config: Deactivate edit buttons if there are no items * firewall.core.io.zone: Fix permanent rich rules using icmp-type (rh#1434594) * firewall.core.fw_ipset: get_ipset may not ckeck if set is applied by default * firewall.core.fw_transaction: Use LastUpdatedOrderedDict for zone transactions - Remove upstream patch: * 0001-firewall.core.fw_ipset-get_ipset-may-not-ckeck-if-se.patch- Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal * firewall-applet: Update active zones and tooltip on reloaded signal * firewall.core.fw_zone: Fix missing chain for helper in rich rules using service (rh#1416578) * Support icmp-type usage in rich rules (rh#1409544) * firewall[-offline]-cmd: Fix --{set,get}-{short,description} for ipset and helper (rh#1416325) * firewall.core.ipset: Solve ipset creation issues with -exist and more flag tests * Speed up start and restart for ipsets with lots of entries (rh#1416817) * Speed up of ipset alteration by adding and removing entries using a file (rh#1416817) * Code cleanup and minor bug fixes * firewall.core.prog: Fix addition of the error output in runProg * New services mssql, kibana, elasticsearch, quassel, bitcoin-rpc, bitcoin-testnet-rpc, bitcoin-testnet, bitcoin and spideroak-lansync * Translation updates - Add upstream patch to fix ipset overloading from /etc/firewalld/ipsets (gh#t-woerner/firewalld#206) * 0001-firewall.core.fw_ipset-get_ipset-may-not-ckeck-if-se.patch- Update to version 0.4.4.2 * firewalld.spec: Added helpers and ipsets paths to firewalld-filesystem * firewall.core.fw_nm: create NMClient lazily * Do not use hard-coded path for modinfo, use autofoo to detect it * firewall.core.io.ifcfg: Dropped invalid option warning with bad format string * firewall.core.io.ifcfg: Properly handle quoted ifcfg values * firewall.core.fw_zone: Do not reset ZONE with ifdown * Updated translations from zanata * firewall-config: Extra grid at bottom to visualize firewalld settings- Update to version 0.4.4.1 * Translation updates form zanata * firewallctl: New support for helpers * firewallctl: Use sys.excepthook to force exception_handler usage always * firewall-config: Use proper source check in sourceDialog- Update to version 0.4.4 * firewall-applet: Use PyQt5 * firewall-config: New nf_conntrack_select dialog, use nf_conntrack_helpers D-Bus property * New helpers Q.931 and RAS from nf_conntrack_h323 * firewall.core.fw_zone: Add zone bingings for PREROUTING in the raw table * firewall.core.ipXtables: Add PREROUTING default rules for zones in raw table * New helper configuration files for amanda, ftp, irc, netbios-ns, pptp, sane, sip, snmp and tftp * firewall-cmd: Fixed --{get,set}-{description,short} for permanent zones * firewall.command: Do not use error code 254 for {ALREADY,NOT}_ENABLED sequences * Misc bug fixes. * For the complete list of changes please see: https://github.com/t-woerner/firewalld/releases/tag/v0.4.4- Relax permissions for default installation files. The files in /usr/lib/firewalld are the default ones as shipped by the package and there is nothing secret in them.- Update to version 0.4.3.3 * Fixes CVE-2016-5410 (bsc#992772) * Standard error is now used for errors and warnings * Several fixes for use in change roots * Systemd service file changes * Fixed translations in firewall-config * Command line clients * Fixes infinite event handling loop in firewall-{config,applet} (bsc#992082)- Update to version 0.4.3.2 * Fix regression with unavailable optional commands * All missing backend messages should be warnings * Individual calls for missing restore commands * Only one authenticate call for add and remove options and also sequences * New service RH-Satellite-6- Update to version 0.4.3.1 * firewall.command: Fix python3 DBusException message not interable error * src/Makefile.am: Fix path in firewall-[offline-]cmd_test.sh while installing * firewallctl: Do not trace back on list command without further arguments * firewallctl (man1): Added remaining sections zone, service, .. * firewallctl: Added runtime-to-permanent, interface and source parser, IndividualCalls setting * firewall.server.config: Allow to set IndividualCalls property in config interface * Fix missing icmp rules for some zones * runProg: Fix issue with running programs * firewall-offline-cmd: Fix issues with missing system-config-firewall * firewall.core.ipXtables: Split up source and dest addresses for transaction * firewall.server.config: Log error in case of loading malformed files in watcher * Install and package the firewallctl man page * Translation updates- Update to version 0.4.3 * New firewallctl utility (rh#1147959) * doc.xml.seealso: Show firewalld.dbus in See Also sections * firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (rh#1339251) * {zone,service,ipset,icmptype}_writer: Do not fail on failed backup * firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd * firewall-cmd: Dropped duplicate setType call in --new-ipset * radius service: Support also tcp ports (RBZ#1219717) * xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources * config.xmlschema.service.xsd: Fix service destination conflicts (rh#1296573) * firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg * firewall.command: Only print summary and description in print_X_info with verbose * firewall.command: print_msg should be able to print empty lines * firewall-config: No processing of runtime passthroughs signals in permanent * Landspace.io fixes and pylint calm downs * firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes * firewall-config: Fixed titles of command and context dialogs, also entry lenths * firewall-config: pylint calm downs * firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit * firewall-config: Use self.active_zoens in conf_zone_added_cb * firewall.command: New parse_port, extended parse methods with more checks * firewall.command: Fixed parse_port to use the separator in the split call * firewall.command: New [de]activate_exception_handler, raise error in parse_X * services ha: Allow corosync-qnetd port * firewall-applet: Support for kde5-nm-connection-editor * tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications * firewall-offline-cmd: Use FirewallCommand for simplification and sequence options * tests/firewall-cmd_test.sh: New tests for service and icmptype modifications * firewall-cmd: Fixed set, remove and query destination options for services * firewall.core.io.service: Source ports have not been checked in _check_config * firewall.core.fw_zone: Method check_source_port is not used, removed * firewall.core.base: Added default to ZONE_TARGETS * firewall.client: Allow to remove ipv:address pair for service destinations * tests/firewall-offline-cmd_test.sh: There is no timeout option in permanent * firewall-cmd: Landscape.io fixes, pylint calm downs * firewall-cmd: Use FirewallCommand for simplification and sequence options * firewall.command: New FirewallCommand for command line client simplification * New services: kshell, rsh, ganglia-master, ganglia-client * firewalld: Cleanup of unused imports, do not translate some deamon messages * firewalld: With fd close interation in runProg, it is not needed here anymore * firewall.core.prog: Add fd close iteration to runProg * firewall.core.fw_nm: Hide NM typelib import, new nm_get_dbus_interface function * firewalld.spec: Require NetworkManager-libnm instead of NetworkManager-glib * firewall-config: New add/remove ipset entries from file, remove all entries * firewall-applet: Fix tooltip after applet start with connection to firewalld * firewall-config: Select new zone, service or icmptype if the view was empty * firewalld.spec: Added build requires for iptables, ebtables and ipset * Adding nf_conntrack_sip module to the service SIP * firewall: core: fw_ifcfg: Quickly return if ifcfg directory does not exist * Drop unneeded python shebangs * Translation updates - Remove obsolete patches: * 0001-src-firewall-core-Drop-unneeded-python-shebangs.patch * 0002-firewall-core-fw_ifcfg-Quickly-return-if-ifcfg-direc.patch * 0003-firewall.core.fw_nm-Hide-NM-typelib-import-new-nm_ge.patch - Add missing %{?_smp_mflags} during install. This will speed up the installation phase as well as expose build system's problems due to higher level of parallelism. - Run make during %build to ensure missing documentation is generated. - spec file cleanups.- Add upstream patch to prevent unconditional dependencies to the NetworkManager typelib (gh#t-woerner/firewalld#119) * 0003-firewall.core.fw_nm-Hide-NM-typelib-import-new-nm_ge.patch- Update to version 0.4.2 * New module to search for and change ifcfg files for interfaces not under control of NM * firewall_config: Enhanced messages in status bar * firewall-config: New message window as overlay if not connected * firewall-config: Fix sentivity of option, view menus and main paned if not connected * firewall-applet: Quit on SIGINT (Ctrl-C), reduced D-Bus calls, some cleanup * firewall-[offline]cmd: Show target in zone information * D-Bus: Completed masquerade methods in FirewallClientZoneSettings * Fixed log-denied rules for icmp-blocks * Keep sorting of interfaces, services, icmp-blocks and other settings in zones * Fixed runtime-to-permanent not to save interfaces under control of NM * New icmp-block-inversion flag in the zones * ICMP type filtering in the zones * New services: sip, sips, managesieve * rich rules: Allow destination action (rh#1163428) * firewall-offline-cmd: New option -q/--quiet * firewall-[offline-]cmd: New --add-[zone,service,ipset,icmptype]-from-file * firewall-[offline-]cmd: Fix option for setting the destination address * firewall-config: Fixed resizing behaviour * New transaction model for speed ups in start, restart, stop and other actions * firewall-cmd: New options --load{zone,service,ipset,icmptype}-defaults * Fixed memory leak in dbus_introspection_add_properties * Landscape.io fixes, pylint calm downs * New D-Bus getXnames methods to speed up firewall-config and firewall-cmd * ebtables-restore: No support for COMMIT command * Source port support in services, zones and rich rules * firewall-offline-cmd: Added --{add,remove}-entries-from-file for ipsets * firewall-config: New active bindings side bar for simple binding changes * Reworked NetworkManager module * Proper default zone handling for NM connections * Try to set zone binding with NM if interface is under control of NM * Code cleanup and bug fixes * Include test suite in the release and install in /usr/share/firewalld/tests * New Travis-CI configuration file * Fixed more broken frensh translations * Translation updates - Add upstream patches * 0001-src-firewall-core-Drop-unneeded-python-shebangs.patch: Removes unneeded python shebangs * 0002-firewall-core-fw_ifcfg-Quickly-return-if-ifcfg-direc.patch: Do not try to access the network-scripts ifcfg directory. - Drop rejected patch * drop-standard-output-error-systemd.patch - Minor spec file clean-up- Avoid runtime dependency on systemd, the macros can all deal with its absence.- Suggest the susefirewall2-to-firewalld package which could assist in migrating the SuSEFirewall2 iptables rules to FirewallD.- Update to version 0.4.1.2 * Install fw_nm module * firewalld: Do not fail if log file could not be opened * Make ipsets visible per default in firewall-config * Fixed translations with python3 [changes in 0.4.1.1] * Fix for broken frensh translation [changes in 0.4.1] * Enhancements of ipset handling * No cleanup of ipsets using timeouts while reloading * Only destroy conflicting ipsets * Only use ipset types supported by the system * Add and remove several ipset entries in one call using a file * Reduce time frame where builtin chains are on policy DROP while reloading * Include descriptions in --info-X calls * Command line interface support to get and alter descriptions of zones, * services, ipsets and icmptypes with permanent option * Properly watch changes in combined zones * Fix logging in rich rule forward rules * Transformed direct.passthrough errors into warnings * Rework of import structures * Reduced calls to get ids for port and protocol names (rh#1305434) * Build and installation fixes by Markos Chandras * Provide D-Bus properties in introspection data * Fix for flaws found by landscape.io * Fix for repeated SUGHUP * New NetworkManager module to get and set zones of connections, used in firewall-applet and firewall-config * configure: Autodetect backend tools ({ip,ip6,eb}tables{,-restore}, ipset) * Code cleanups * Bug fixes - Fix drop-standard-output-error-systemd.patch tagging - Add libxslt-tools build dependency- Do not recommend a specific version for the lang subpackage- Move translations to a new subpackage- Set DISABLE_RESTART_ON_UPDATE to 'yes' instead of '1'. The macros in /etc/rpm/macros.systemd only check for the 'yes' value so fix it to properly prevent the firewalld service from being restarted during updates.- Drop typelib(NetworkManager), NetworkManager-glib, gtk3 and libnotify dependencies (see OBS SR#360792)- firewall-config needs typelib(NetworkManager) to run- Initial commit. Version 0.4.0 * drop-standard-output-error-systemd.patch (gh#t-woerner/firewalld/pull/67)lamb57 1553531785  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgijklmnopqrstuvwxyz0.5.5-lp150.2.22.2 firewall__init__.py__pycache____init__.cpython-36.pycclient.cpython-36.pyccommand.cpython-36.pycdbus_utils.cpython-36.pycerrors.cpython-36.pycfunctions.cpython-36.pycfw_types.cpython-36.pycclient.pycommand.pyconfig__init__.py__pycache____init__.cpython-36.pycdbus.cpython-36.pycdbus.pycore__init__.py__pycache____init__.cpython-36.pycbase.cpython-36.pycebtables.cpython-36.pycfw.cpython-36.pycfw_config.cpython-36.pycfw_direct.cpython-36.pycfw_helper.cpython-36.pycfw_icmptype.cpython-36.pycfw_ifcfg.cpython-36.pycfw_ipset.cpython-36.pycfw_nm.cpython-36.pycfw_policies.cpython-36.pycfw_service.cpython-36.pycfw_test.cpython-36.pycfw_transaction.cpython-36.pycfw_zone.cpython-36.pychelper.cpython-36.pycicmp.cpython-36.pycipXtables.cpython-36.pycipset.cpython-36.pyclogger.cpython-36.pycmodules.cpython-36.pycprog.cpython-36.pycrich.cpython-36.pycwatcher.cpython-36.pycbase.pyebtables.pyfw.pyfw_config.pyfw_direct.pyfw_helper.pyfw_icmptype.pyfw_ifcfg.pyfw_ipset.pyfw_nm.pyfw_policies.pyfw_service.pyfw_test.pyfw_transaction.pyfw_zone.pyhelper.pyicmp.pyio__init__.py__pycache____init__.cpython-36.pycdirect.cpython-36.pycfirewalld_conf.cpython-36.pycfunctions.cpython-36.pychelper.cpython-36.pycicmptype.cpython-36.pycifcfg.cpython-36.pycio_object.cpython-36.pycipset.cpython-36.pyclockdown_whitelist.cpython-36.pycservice.cpython-36.pyczone.cpython-36.pycdirect.pyfirewalld_conf.pyfunctions.pyhelper.pyicmptype.pyifcfg.pyio_object.pyipset.pylockdown_whitelist.pyservice.pyzone.pyipXtables.pyipset.pylogger.pymodules.pyprog.pyrich.pywatcher.pydbus_utils.pyerrors.pyfunctions.pyfw_types.pyserver__init__.py__pycache____init__.cpython-36.pycconfig.cpython-36.pycconfig_helper.cpython-36.pycconfig_icmptype.cpython-36.pycconfig_ipset.cpython-36.pycconfig_service.cpython-36.pycconfig_zone.cpython-36.pycdecorators.cpython-36.pycfirewalld.cpython-36.pycserver.cpython-36.pycconfig.pyconfig_helper.pyconfig_icmptype.pyconfig_ipset.pyconfig_service.pyconfig_zone.pydecorators.pyfirewalld.pyserver.py/usr/lib/python3.6/site-packages//usr/lib/python3.6/site-packages/firewall//usr/lib/python3.6/site-packages/firewall/__pycache__//usr/lib/python3.6/site-packages/firewall/config//usr/lib/python3.6/site-packages/firewall/config/__pycache__//usr/lib/python3.6/site-packages/firewall/core//usr/lib/python3.6/site-packages/firewall/core/__pycache__//usr/lib/python3.6/site-packages/firewall/core/io//usr/lib/python3.6/site-packages/firewall/core/io/__pycache__//usr/lib/python3.6/site-packages/firewall/server//usr/lib/python3.6/site-packages/firewall/server/__pycache__/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9867/openSUSE_Leap_15.0_Update/869a01324cf28c51b5c249b6b0b890eb-firewalld.openSUSE_Leap_15.0_Updatedrpmxz5noarch-suse-linuxdirectoryemptypython 3.6 byte-compiledPython script, ASCII text executableASCII text  !"#$%&'()*+,-./01236789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[^_`abcdefghijklmoqsuwyz}RRRRRRRRRR R RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR RR RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR R RRRRRRRRRRRRRRRRR RR RR RR RR RR RRR R RR R \r̅vlzutf-88ed17317467e882619ff9bb66c74c288e168b289782c6f4cc3d8b375dae133a6? 7zXZ !t/O]"k%4Pa h% $9jJgL^1ɶ;g ~+#w˧*;[{}'ÑicCUa]_{5^Nҕ{Rg&JkELJbj5_mb8a?-22ۧAvpG )|̙T֠\,×ʨ>Z$XqLsZiK١~Q:~}#|@[M)s#K@tnzW+~X=`g=H{ݾxk%R\m̌[6{!eE]̊xz{_ův;]?a-2VoVYRZO0C+bzsl\,y6G%}9|Q~ !G"d٥FOU&1ǖ7^aFA0?_ ZUWz% dcE^',OkMQw>-C HON66A3ѐ BD`9Ö' $1_6u3Zл1u3kBd$c9ʞ D;cE,;u)-4WiY )-l>3+aMCփ?d vaZ1D=Z9u, }T N_W8x.e֢qC0(^Fw~9B"-?RxyWP\ تR;(H/B*-4ܲZ`FMjB+KFJcZϱ|CȖ\sR?Ս$%t_E,&ohO_(fZaõ.|H\d[˜x7N~Q4NI7IPVi[h0y%XɃBV{6C=鏺Oa9A7׍kGQȱ#ek&Ĥ/LM=@͗о 2OO<۲6#= YZ