firewalld-lang-0.5.5-lp150.2.22.2<>,Ԑ\/=„>x^Agn3a=IGm#fߍW v&18) XƗrZ$\u}[,3S6فZ}tz%|; 2XqkI;;xdT`>?}y&8ӈm&3ؚN: i#4FL^oj~+V aeb)yxb }^-s瘜>> ?d $ G|  -- - t- (- - -x-Y-:`-8L(8090:o0F;GP-H-I-XHYP\l-] -^i-b{c$deflu-vzCfirewalld-lang0.5.5lp150.2.22.2Translations for package firewalldProvides translations for the "firewalld" package.\lamb57GopenSUSE Leap 15.0openSUSEGPL-2.0-or-laterhttp://bugs.opensuse.orgSystem/Localizationhttp://www.firewalld.orglinuxnoarch;<@ a<:;d"YMy$3*(,a?bdf|8,=\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\e\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\f\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-0.5.5-lp150.2.22.2.src.rpmfirewalld-langfirewalld-lang-all    firewalldrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.5.53.0.4-14.6.0-14.0-15.2-14.14.1\A[0[Ѱ@[$@[t[[v[h8@[?Y[Zz@Z3@Z̧@ZZZZZs@Z;@Z@ZOZ@Zr@Z }Z ,@ZY6@XXXEVX)@X2@WiW@W{@WrfWj}WXWM|W,@W#LWV޾VՄ@V2V@V@VHMichał Rostecki Marketa Calabkova Markos Chandras Markos Chandras Markos Chandras Markos Chandras mchandras@suse.demchandras@suse.demchandras@suse.desbrabec@suse.commchandras@suse.desbrabec@suse.comsbrabec@suse.commchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dedimstar@opensuse.orgmchandras@suse.derbrown@suse.commpluskal@suse.commchandras@suse.demchandras@suse.dempluskal@suse.commchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dejengelh@inai.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.demchandras@suse.dejslaby@suse.commchandras@suse.de- Add upstream patch to fix the error in --runtime-to-permanent option about 'settings' variable being referenced before assignment. This error occurs only when NetworkManager is not used. (bsc#1122151) * 0001-firewalld-fix-runtime-to-permanent-if-NM-not-in-use.patch- Import SUSE translations (boo#1108832) * added firewalld-0.5.5-po-20181105.tar.xz- Add upstream patch to fix a python stacktrace when getting the zone for a NetworkManager connection (bsc#1106319) * 0001-firewall-core-fw_nm-nm_get_zone_of_connection-should.patch- Add adapted upstream patch to make --reload/--complete-reload forget the runtime configuration and always load the permanent one (bsc#1112008) * 0001-firewall-core-Always-reload-the-permanent-configurat.patch- Add upstream patch to mark more strings as translatable (bsc#1096542) * 0001-Fix-translating-labels-392.patch - Add upstream patches to fix NetworkManager integration (bsc#1109074) * 0001-fw_nm-Make-nm_get_zone_of_connection-only-check-perm.patch * 0002-firewall-cmd-On-getZoneOfInterface-only-ask-NM-for-p.patch * 0003-firewall-cmd-For-non-permanent-interface-changes-don.patch * 0004-fw_nm-New-function-to-get-all-interfaces-from-NM.patch * 0005-fw_nm-Add-nm_get_interfaces_in_zone.patch * 0006-firewall-cmd-Ask-NM-when-listing-permanent-interface.patch * 0007-firewall-cmd-Allow-passing-extra-interfaces-to-print.patch - Add upstream patch to fix ifcfg ZONE attribute on permanent firewall changes (bsc#1109153) * 0001-ifcfg-Modify-ZONE-on-permanent-config-changes.patch- Update to 0.5.5 (bsc#1108420) * update translations * firewall/core/fw_nm: nm_get_zone_of_connection should return None or empty string instead of False * fw: If direct rules fail to apply add a "Direct" label to error msg * fw: if startup fails on reload, reapply non-perm config that survives reload - spec-cleaner fixes- Update to 0.5.4 (bsc#1105170) * update translations * fw: if failure occurs during startup set state to FAILED * fw_direct: avoid log for untracked passthrough queries * firewall-config: fix some untranslated strings * Rich Rule Masquerade inverted source-destination in Forward Chain * don't forward interface to zone requests to NM for generated interfaces * firewall-cmd: add --check-config option * firewall-offline-cmd: add --check-config option * ipset: check type when parsing ipset definition * firewall-config: Add ipv6-icmp to the protocol dropdown box * core: logger: Remove world-readable bit from logfile * IPv6 rpfilter: explicitly allow neighbor solicitation - Remove patches that have made it upstream: * 0001-firewall-config-fix-some-untranslated-strings.patch * 0001-firewall-config-Add-ipv6-icmp-to-the-protocol-dropdo.patch * 0001-core-logger-Remove-world-readable-bit-from-logfile-3.patch * firewalld-0.5.3-po-20180417.tar.xz- Mark more strings as translatable when creating rich rules (bsc#1096542) * 0001-firewall-config-fix-some-untranslated-strings.patch- Backport the following upstream fixes: * Add missig ipv6-icmp protocol to UI drop-down list (bsc#1099698) - 0001-firewall-config-Add-ipv6-icmp-to-the-protocol-dropdo.patch * Drop global read permissions from the log file (bsc#1098986) - 0001-core-logger-Remove-world-readable-bit-from-logfile-3.patch- Merge SUSE translations to version 0.5.3, fix typos (boo#1094051, add firewalld-0.5.3-po-20180417.tar.xz, remove firewalld-po-20180417.tar.xz).- Update to 0.5.3 (bsc#1093120) * tests/regression: add test for ipset with timeout * ipset: allow adding entries to ipsets with timeout * translations: update * helpers: load helper module explicitly if no port given * helpers: nf_conntrack_proto-* helpers needs name cropped * config/Makefile: correct name of proto-gre helper * tests/regression: test helper nf_conntrack_proto_gre (#263) * functions: get_nf_nat_helpers() should look in other directories too * functions: Allow nf_conntrack_proto_* helpers * services: Add GRE * helpers: Add proto-gre * tests/regression: add test to verify ICMP block in forward chain * ipXtables: fix ICMP block not being present in FORWARD chain- Translations update to version 20180417 (bsc#1081623): * Minor fixes of ar, ko, nl.- Translations update (bsc#1081623).- Backport upstream patches to add additional services (bsc#1082033) * firewalld-add-additional-services.patch- Update to 0.5.2 * fix rule deduplication causing accidental removal of rules * log failure to parse direct rules xml as an error * firewall-config: Break infinite loop when firewalld is not running (bsc#1082470, bsc#1085205) * fix set-log-denied not taking effect * po: update translations - Remove obsolete patches which are now upstream * 0001-src-firewall-config-Fix-default-value-for-dialog-but.patch * 0002-src-firewall-config-Break-infinite-loop-when-firewal.patch- Update to 0.5.1 (bsc#1084026) * ipXtables: fix iptables-restore wait option detection * python3: use "foo in dict" not dict.has_key(foo) * Fix potential python3 keys() incompatibility in watcher * Fixed python3 compatibility * ebtables: fix missing default value to set_rule() * fw_zone: fix invalid reference to __icmp_block_inversion * zones: Correct and defer check_name for combined zones * firewallctl: mark deprecated (gh#firewalld/firewalld##261) * Add nmea-0183 service * Add sycthing-gui service * Add syncthing service * Adding FirewallD jenkins service (gh#firewalld/firewalld#256) * services/high-availability: Add port 9929 * Fix and improve firewalld-sysctls.conf * firewalld: also reload dbus config interface for global options * Add MongoDB service definition * src: firewall: Add support for SUSE ifcfg scripts * Add UPnP client service * firewalld: Allow specifying log file location * firewalld/firewall-offline-cmd: Allow setting system config directories - Drop obsolete patch * 0001-suse-ifcfg-files.patch - Drop tests installation- Add upstream patches to fix endless loop in firewall-config when firewalld is not running (bsc#1082470) * 0001-src-firewall-config-Fix-default-value-for-dialog-but.patch * 0002-src-firewall-config-Break-infinite-loop-when-firewal.patch- Remove high-availability service. SUSE HA uses the cluster service provided by the yast2-cluster package (bsc#1078223)- Introduce new python3-firewall and firewall-macros subpackages. The first one contains the firewalld python3 bindings and the second one contains the RPM macros for firewalld.- Replace dbus-1-python requires with dbus-1-python3: since firewalld was migrated to python3, we also have to require the python3 dependencies (boo#1070310).- Add missing python3-gobject-Gdk dependency (boo#1069952)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Make sure to use python3 everywhere (boo#1068778)- Add combined upstream patch to support SUSE ifcfg network files. * 0001-suse-ifcfg-files.patch (gh#firewalld/firewalld#262, fate#323460)- Update to version 0.4.4.6 * firewall.core.fw_config: Fix check for icmp builtin name * config.services: docker-swarm: fix incorrect attribute * xmlschema/service.xsd: Fix protocol looking for name instead of value * Add docker swarm service (gh#firewalld/firewalld#230) * Adding FirewallD redis service (gh#firewalld/firewalld#248) * Adding firewalld zabbix server and agent services (gh#firewalld/firewalld#221) * firewall-offline-cmd: Don't require root for help output * doc: firewall-cmd: Document --query-* options return codes * firewall-cmd: Use colors only if output is a TTY * core: Log unsupported ICMP types as informational only * add bgp service to predefined services edit to config/Makefile.am * Add git service * Add kprop service * minidlna definitions (gh#firewalld/firewalld#236) * SpiderOak ONE listens on port 21327 and 21328 * autogen.sh: Allow skipping configure via NOCONFIGURE env var * Add missing ports to RH-Satellite-6 service * Reload nf_conntrack sysctls after the module is loaded * Add NFSv3 service. * config/Makefile.am: Add murmur service (a95eed1) * add new service IRC * firewall.core.prog: Simplify runProg output: Combine stderr and stdout * firewall.core.fw: Fix possible dict size change in for loop * firewall.core.fw: Use new firewalld git repo in firewalld organization * config/firewall-config.appdata.xml.in: Use new firewalld git repo in firewalld organization * firewall.core.fw_zone: Rich-rule ICMP type: Error only for conflicting family * firewall.core.rich: Add checks for Rich_Source validation * Handle also IPv6 with the zone masquerade flag * Add IPv6 support for forward-ports in zones * firewall.command: Enable parse_forward_port to work with IPv6 adresses * firewall.core.fw_zone: Fix IPv6 address in rich rule forward ports * add Murmur (Mumble server) service - spec file fixes to avoid rpmlint warnings about duplicate files.- Switch to python3 - Run spec cleaner - Move autogen to build section - Add systemd requirements- Update to version 0.4.4.5 * firewall-offline-cmd: Fix --remove-service-from-zone option (rh#1438127) * Support sctp and dccp in ports, source-ports, forward-ports, helpers and rich rules * firewall-cmd: Fix --{set,get}-{short,description} for zone * firewall.core.ipXtables: Use new wait option for restore commands if available * Adding ovirt-vmconsole service file * Adding oVirt storage-console service. * Adding ctdb service file. * Adding service file for nrpe. * Rename extension for policy choices (server and desktop) to .policy.choice (rh#1449754) * D-Bus interfaces: Fix GetAll for interfaces without properties (rh#1452017) * firewall.core.fw_config: Fix wrong variable use in repr output * firewall.core.fw_icmptype: Add missing import for copy * firewall.core.fw_test: Fix wrong format string in repr * firewall.core.io.zone: Fix getattr use on super(Zone) * firewall.functions: New function get_nf_nat_helpers * firewall.core.fw: Get NAT helpers and store them internally. * firewall.core.fw_zone: Load NAT helpers with conntrack helpers * firewalld.dbus: Add missing properties nf_conntrach_helper_setting and nf_conntrack_helpers * firewall.server.firewalld: New property for NAT helpers supported by the kernel- Update to version 0.4.4.4 * Drop references to fedorahosted.org from spec file and Makefile.am * firewall-config: Show invalid ipset type in the ipset dialog in the bad label * firewall.core.fw: Show icmptypes and ipsets with type errors in permanent env * firewall.server.firewalld: Provide information about the supported icmp types * firewall.core.fw_icmptype: Add ICMP type only if the type is supported * firewall.core.fw: New attributes ip{4,6}tables_supported_icmp_types * firewall.core.ipXtables: New method supported_icmp_types * firewall-config: Deactivate edit buttons if there are no items * firewall.core.io.zone: Fix permanent rich rules using icmp-type (rh#1434594) * firewall.core.fw_ipset: get_ipset may not ckeck if set is applied by default * firewall.core.fw_transaction: Use LastUpdatedOrderedDict for zone transactions - Remove upstream patch: * 0001-firewall.core.fw_ipset-get_ipset-may-not-ckeck-if-se.patch- Update to version 0.4.4.3 * New service freeipa-trust (rh#1411650) * Complete icmp types for IPv4 and IPv6 * New h323 helper container * Support helper container: h323 * firewall.server.decorators: ALREADY_ errors should be logged as warnings * firewall.command: ALREADY_SET should also result in zero exit code * tests/firewall-offline-cmd_test.sh: Only use firewall-offline-cmd * Support more ipset types: hash:ip,port, hash:ip,port,ip, hash:ip,port,net, hash:ip,mark, hash:net,net, hash:net,port, hash:net,port,net, hash:net,iface * New checks for ipset entry validation * Use ipset dimension for match * firewall.core.base: New ZONE_SOURCE_IPSET_TYPES list * New firewall.core.icmp providing names and types for icmp and icmpv6 values * firewall.core.fw_ipset: New methods to get ipset dimension and applied state * firewall.errors: New error NOT_APPLIED * firewall-cmd man page: Add missing --get-ipset-types * firewall.core.fw_nm: No trace back on failed get_connection call (rh#1413345) * firewall.core.prog: Fix addition of the error output in runProg * Speed up ipset handling, (re)loading and import from file * Support --family option for --new-ipset * Handle FirewallError for query sequences in command line tools * Fail to alter entries of ipsets with timeout * Extended tests for ipset options * Return empty list for ipsets using timeouts * firewall.functions: Fix checks in checkIPnMask and checkIP6nMask (gh#t-woerner/firewalld#186) * firewalld.conf man page: New section about AutomaticHelpers * firewall-offline-cmd man page: Added -v and -q options, fixed section ids * firewall{-cmd, ctl}: Fix scope of final return in try_set_zone_of_interface * firewall.core.fw_zone: Limit masquerading forward rule to new connections * firewall-config: Update active zones on reloaded signal * firewall-applet: Update active zones and tooltip on reloaded signal * firewall.core.fw_zone: Fix missing chain for helper in rich rules using service (rh#1416578) * Support icmp-type usage in rich rules (rh#1409544) * firewall[-offline]-cmd: Fix --{set,get}-{short,description} for ipset and helper (rh#1416325) * firewall.core.ipset: Solve ipset creation issues with -exist and more flag tests * Speed up start and restart for ipsets with lots of entries (rh#1416817) * Speed up of ipset alteration by adding and removing entries using a file (rh#1416817) * Code cleanup and minor bug fixes * firewall.core.prog: Fix addition of the error output in runProg * New services mssql, kibana, elasticsearch, quassel, bitcoin-rpc, bitcoin-testnet-rpc, bitcoin-testnet, bitcoin and spideroak-lansync * Translation updates - Add upstream patch to fix ipset overloading from /etc/firewalld/ipsets (gh#t-woerner/firewalld#206) * 0001-firewall.core.fw_ipset-get_ipset-may-not-ckeck-if-se.patch- Update to version 0.4.4.2 * firewalld.spec: Added helpers and ipsets paths to firewalld-filesystem * firewall.core.fw_nm: create NMClient lazily * Do not use hard-coded path for modinfo, use autofoo to detect it * firewall.core.io.ifcfg: Dropped invalid option warning with bad format string * firewall.core.io.ifcfg: Properly handle quoted ifcfg values * firewall.core.fw_zone: Do not reset ZONE with ifdown * Updated translations from zanata * firewall-config: Extra grid at bottom to visualize firewalld settings- Update to version 0.4.4.1 * Translation updates form zanata * firewallctl: New support for helpers * firewallctl: Use sys.excepthook to force exception_handler usage always * firewall-config: Use proper source check in sourceDialog- Update to version 0.4.4 * firewall-applet: Use PyQt5 * firewall-config: New nf_conntrack_select dialog, use nf_conntrack_helpers D-Bus property * New helpers Q.931 and RAS from nf_conntrack_h323 * firewall.core.fw_zone: Add zone bingings for PREROUTING in the raw table * firewall.core.ipXtables: Add PREROUTING default rules for zones in raw table * New helper configuration files for amanda, ftp, irc, netbios-ns, pptp, sane, sip, snmp and tftp * firewall-cmd: Fixed --{get,set}-{description,short} for permanent zones * firewall.command: Do not use error code 254 for {ALREADY,NOT}_ENABLED sequences * Misc bug fixes. * For the complete list of changes please see: https://github.com/t-woerner/firewalld/releases/tag/v0.4.4- Relax permissions for default installation files. The files in /usr/lib/firewalld are the default ones as shipped by the package and there is nothing secret in them.- Update to version 0.4.3.3 * Fixes CVE-2016-5410 (bsc#992772) * Standard error is now used for errors and warnings * Several fixes for use in change roots * Systemd service file changes * Fixed translations in firewall-config * Command line clients * Fixes infinite event handling loop in firewall-{config,applet} (bsc#992082)- Update to version 0.4.3.2 * Fix regression with unavailable optional commands * All missing backend messages should be warnings * Individual calls for missing restore commands * Only one authenticate call for add and remove options and also sequences * New service RH-Satellite-6- Update to version 0.4.3.1 * firewall.command: Fix python3 DBusException message not interable error * src/Makefile.am: Fix path in firewall-[offline-]cmd_test.sh while installing * firewallctl: Do not trace back on list command without further arguments * firewallctl (man1): Added remaining sections zone, service, .. * firewallctl: Added runtime-to-permanent, interface and source parser, IndividualCalls setting * firewall.server.config: Allow to set IndividualCalls property in config interface * Fix missing icmp rules for some zones * runProg: Fix issue with running programs * firewall-offline-cmd: Fix issues with missing system-config-firewall * firewall.core.ipXtables: Split up source and dest addresses for transaction * firewall.server.config: Log error in case of loading malformed files in watcher * Install and package the firewallctl man page * Translation updates- Update to version 0.4.3 * New firewallctl utility (rh#1147959) * doc.xml.seealso: Show firewalld.dbus in See Also sections * firewall.core.fw_config: Create backup on zone, service, ipset and icmptype removal (rh#1339251) * {zone,service,ipset,icmptype}_writer: Do not fail on failed backup * firewall-[offline-]cmd: Fix --new-X-from-file options for files in cwd * firewall-cmd: Dropped duplicate setType call in --new-ipset * radius service: Support also tcp ports (RBZ#1219717) * xmlschemas: Support source-port, protocol, icmp-block-inversion and ipset sources * config.xmlschema.service.xsd: Fix service destination conflicts (rh#1296573) * firewall-cmd, firewalld man: Information about new NetworkManager and ifcfg * firewall.command: Only print summary and description in print_X_info with verbose * firewall.command: print_msg should be able to print empty lines * firewall-config: No processing of runtime passthroughs signals in permanent * Landspace.io fixes and pylint calm downs * firewall.core.io.zone: Add zone_reader and zone_writer to all, pylint fixes * firewall-config: Fixed titles of command and context dialogs, also entry lenths * firewall-config: pylint calm downs * firewall.core.fw_zone: Fix use of MAC source in rich rules without ipv limit * firewall-config: Use self.active_zoens in conf_zone_added_cb * firewall.command: New parse_port, extended parse methods with more checks * firewall.command: Fixed parse_port to use the separator in the split call * firewall.command: New [de]activate_exception_handler, raise error in parse_X * services ha: Allow corosync-qnetd port * firewall-applet: Support for kde5-nm-connection-editor * tests/firewall-offline-cmd_test.sh: New tests for service and icmptype modifications * firewall-offline-cmd: Use FirewallCommand for simplification and sequence options * tests/firewall-cmd_test.sh: New tests for service and icmptype modifications * firewall-cmd: Fixed set, remove and query destination options for services * firewall.core.io.service: Source ports have not been checked in _check_config * firewall.core.fw_zone: Method check_source_port is not used, removed * firewall.core.base: Added default to ZONE_TARGETS * firewall.client: Allow to remove ipv:address pair for service destinations * tests/firewall-offline-cmd_test.sh: There is no timeout option in permanent * firewall-cmd: Landscape.io fixes, pylint calm downs * firewall-cmd: Use FirewallCommand for simplification and sequence options * firewall.command: New FirewallCommand for command line client simplification * New services: kshell, rsh, ganglia-master, ganglia-client * firewalld: Cleanup of unused imports, do not translate some deamon messages * firewalld: With fd close interation in runProg, it is not needed here anymore * firewall.core.prog: Add fd close iteration to runProg * firewall.core.fw_nm: Hide NM typelib import, new nm_get_dbus_interface function * firewalld.spec: Require NetworkManager-libnm instead of NetworkManager-glib * firewall-config: New add/remove ipset entries from file, remove all entries * firewall-applet: Fix tooltip after applet start with connection to firewalld * firewall-config: Select new zone, service or icmptype if the view was empty * firewalld.spec: Added build requires for iptables, ebtables and ipset * Adding nf_conntrack_sip module to the service SIP * firewall: core: fw_ifcfg: Quickly return if ifcfg directory does not exist * Drop unneeded python shebangs * Translation updates - Remove obsolete patches: * 0001-src-firewall-core-Drop-unneeded-python-shebangs.patch * 0002-firewall-core-fw_ifcfg-Quickly-return-if-ifcfg-direc.patch * 0003-firewall.core.fw_nm-Hide-NM-typelib-import-new-nm_ge.patch - Add missing %{?_smp_mflags} during install. This will speed up the installation phase as well as expose build system's problems due to higher level of parallelism. - Run make during %build to ensure missing documentation is generated. - spec file cleanups.- Add upstream patch to prevent unconditional dependencies to the NetworkManager typelib (gh#t-woerner/firewalld#119) * 0003-firewall.core.fw_nm-Hide-NM-typelib-import-new-nm_ge.patch- Update to version 0.4.2 * New module to search for and change ifcfg files for interfaces not under control of NM * firewall_config: Enhanced messages in status bar * firewall-config: New message window as overlay if not connected * firewall-config: Fix sentivity of option, view menus and main paned if not connected * firewall-applet: Quit on SIGINT (Ctrl-C), reduced D-Bus calls, some cleanup * firewall-[offline]cmd: Show target in zone information * D-Bus: Completed masquerade methods in FirewallClientZoneSettings * Fixed log-denied rules for icmp-blocks * Keep sorting of interfaces, services, icmp-blocks and other settings in zones * Fixed runtime-to-permanent not to save interfaces under control of NM * New icmp-block-inversion flag in the zones * ICMP type filtering in the zones * New services: sip, sips, managesieve * rich rules: Allow destination action (rh#1163428) * firewall-offline-cmd: New option -q/--quiet * firewall-[offline-]cmd: New --add-[zone,service,ipset,icmptype]-from-file * firewall-[offline-]cmd: Fix option for setting the destination address * firewall-config: Fixed resizing behaviour * New transaction model for speed ups in start, restart, stop and other actions * firewall-cmd: New options --load{zone,service,ipset,icmptype}-defaults * Fixed memory leak in dbus_introspection_add_properties * Landscape.io fixes, pylint calm downs * New D-Bus getXnames methods to speed up firewall-config and firewall-cmd * ebtables-restore: No support for COMMIT command * Source port support in services, zones and rich rules * firewall-offline-cmd: Added --{add,remove}-entries-from-file for ipsets * firewall-config: New active bindings side bar for simple binding changes * Reworked NetworkManager module * Proper default zone handling for NM connections * Try to set zone binding with NM if interface is under control of NM * Code cleanup and bug fixes * Include test suite in the release and install in /usr/share/firewalld/tests * New Travis-CI configuration file * Fixed more broken frensh translations * Translation updates - Add upstream patches * 0001-src-firewall-core-Drop-unneeded-python-shebangs.patch: Removes unneeded python shebangs * 0002-firewall-core-fw_ifcfg-Quickly-return-if-ifcfg-direc.patch: Do not try to access the network-scripts ifcfg directory. - Drop rejected patch * drop-standard-output-error-systemd.patch - Minor spec file clean-up- Avoid runtime dependency on systemd, the macros can all deal with its absence.- Suggest the susefirewall2-to-firewalld package which could assist in migrating the SuSEFirewall2 iptables rules to FirewallD.- Update to version 0.4.1.2 * Install fw_nm module * firewalld: Do not fail if log file could not be opened * Make ipsets visible per default in firewall-config * Fixed translations with python3 [changes in 0.4.1.1] * Fix for broken frensh translation [changes in 0.4.1] * Enhancements of ipset handling * No cleanup of ipsets using timeouts while reloading * Only destroy conflicting ipsets * Only use ipset types supported by the system * Add and remove several ipset entries in one call using a file * Reduce time frame where builtin chains are on policy DROP while reloading * Include descriptions in --info-X calls * Command line interface support to get and alter descriptions of zones, * services, ipsets and icmptypes with permanent option * Properly watch changes in combined zones * Fix logging in rich rule forward rules * Transformed direct.passthrough errors into warnings * Rework of import structures * Reduced calls to get ids for port and protocol names (rh#1305434) * Build and installation fixes by Markos Chandras * Provide D-Bus properties in introspection data * Fix for flaws found by landscape.io * Fix for repeated SUGHUP * New NetworkManager module to get and set zones of connections, used in firewall-applet and firewall-config * configure: Autodetect backend tools ({ip,ip6,eb}tables{,-restore}, ipset) * Code cleanups * Bug fixes - Fix drop-standard-output-error-systemd.patch tagging - Add libxslt-tools build dependency- Do not recommend a specific version for the lang subpackage- Move translations to a new subpackage- Set DISABLE_RESTART_ON_UPDATE to 'yes' instead of '1'. The macros in /etc/rpm/macros.systemd only check for the 'yes' value so fix it to properly prevent the firewalld service from being restarted during updates.- Drop typelib(NetworkManager), NetworkManager-glib, gtk3 and libnotify dependencies (see OBS SR#360792)- firewall-config needs typelib(NetworkManager) to run- Initial commit. Version 0.4.0 * drop-standard-output-error-systemd.patch (gh#t-woerner/firewalld/pull/67)lamb57 1553531785  !"#$%&'()*+,-arasbgbncacsdadeeleneneseteufifrglguhihuiaitjaknkomlmrnlorpaplptptrusksqsrsr@latinsvtatetrukzhzh0.5.5-lp150.2.22.20.5.5  !"#$%&'()*+,firewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mofirewalld.mo/usr/share/locale/ar/LC_MESSAGES//usr/share/locale/as/LC_MESSAGES//usr/share/locale/bg/LC_MESSAGES//usr/share/locale/bn_IN/LC_MESSAGES//usr/share/locale/ca/LC_MESSAGES//usr/share/locale/cs/LC_MESSAGES//usr/share/locale/da/LC_MESSAGES//usr/share/locale/de/LC_MESSAGES//usr/share/locale/el/LC_MESSAGES//usr/share/locale/en_GB/LC_MESSAGES//usr/share/locale/en_US/LC_MESSAGES//usr/share/locale/es/LC_MESSAGES//usr/share/locale/et/LC_MESSAGES//usr/share/locale/eu/LC_MESSAGES//usr/share/locale/fi/LC_MESSAGES//usr/share/locale/fr/LC_MESSAGES//usr/share/locale/gl/LC_MESSAGES//usr/share/locale/gu/LC_MESSAGES//usr/share/locale/hi/LC_MESSAGES//usr/share/locale/hu/LC_MESSAGES//usr/share/locale/ia/LC_MESSAGES//usr/share/locale/it/LC_MESSAGES//usr/share/locale/ja/LC_MESSAGES//usr/share/locale/kn/LC_MESSAGES//usr/share/locale/ko/LC_MESSAGES//usr/share/locale/ml/LC_MESSAGES//usr/share/locale/mr/LC_MESSAGES//usr/share/locale/nl/LC_MESSAGES//usr/share/locale/or/LC_MESSAGES//usr/share/locale/pa/LC_MESSAGES//usr/share/locale/pl/LC_MESSAGES//usr/share/locale/pt/LC_MESSAGES//usr/share/locale/pt_BR/LC_MESSAGES//usr/share/locale/ru/LC_MESSAGES//usr/share/locale/sk/LC_MESSAGES//usr/share/locale/sq/LC_MESSAGES//usr/share/locale/sr/LC_MESSAGES//usr/share/locale/sr@latin/LC_MESSAGES//usr/share/locale/sv/LC_MESSAGES//usr/share/locale/ta/LC_MESSAGES//usr/share/locale/te/LC_MESSAGES//usr/share/locale/tr/LC_MESSAGES//usr/share/locale/uk/LC_MESSAGES//usr/share/locale/zh_CN/LC_MESSAGES//usr/share/locale/zh_TW/LC_MESSAGES/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9867/openSUSE_Leap_15.0_Update/869a01324cf28c51b5c249b6b0b890eb-firewalld.openSUSE_Leap_15.0_Updatedrpmxz5noarch-suse-linux\r̅vlzfirewalldutf-831bdac3cea7ad818e71601cf439adfdc9cee31afc644a3af098806053c95ed64? 7zXZ !t/aC9]"k%Kӆ FeBh)j.EU*L K{'G ؛bЊsi*Wo|&:Ꟁwa3 )ȏa5LN^!FXrF-87I"YL/$;p :`9o.TޚĂ'tXTYŭU?K hsDa@7`1?zO>)ۇƽrh~UOĐ`5NJ@< ®ZRuU^. Y„uN7<Zne^Ua^b![484)]ʒqk4777E3n꭭O%+q>Ak { Rd&^bϗXR9yL}> 㴳={#SMF ydIٳK#$Z2>>u.,WvMYt8Ls;cp:8nTE'ưℭO.X/P(M;^ʭy\YOא9q#|̹S& ]Ldz "`!([uZP| ?дG}4_8(5΁+_#m+#+#:Qd%A4DuiQ"L$ܴ C5{dW^ Wl ͠ ]~v9-^kW]nj,(la(2\Z/n6"n JhJ*#}OSO\hXC܀5LeMGDC(nʈ@醦1TJ(Ѹ|xa>d;#T Ά >r$M^1yo1D?sd=")ƏHVtdy!䂼hvzu5Hk;KKQ }M%A 0q-9a_8'%Xf+b=!Xs}l`*X:WA ץaK!vp4M3]2Δ]Lġa6ѿX2,ذ6\ vEV3<Ϻt an qIN0ZHW%ؒMبW} Df! tH9 3V va\E8_#64QA&&$ЪmZoXPN 8~ϝHrX<;RK-mu1-5;+gМL|#lb~xHL,۳_]`[\EWUP+] J72e\h+>jWned%KYU![Z `JڀK-4iR) "\k^5R=|$κ5#ÂN/:e:*v6ώ5ѧ{ qhH{T teFA{Ckr+B0m د&hcKWܰyN+935 XPj(j~85H*nORe4Ktz}QGhŸ:mf!3, ٫.۷pv!@_B!ÙuI Ă_BQM\u퉹lx*{9d=^X'YRi=6Gۈ`rl^+>SL<ʠ3\g5duAkɰEBx" 0{r)#B2k/=yh~ȶ[5$(͑|Zo%^᝙hLeE V8%-!I_3ӼIMٚ\U tMv0j)Z դ"5uPڻkhhScw IZ݂!:1C$'3㨂,0a%zUb15/ʤK|0v#47qI0߱s^Sn'(׆&F7m;ϐU#)JA[1(53h݊Zc$2Mʟ!= l&_\D2c'ㅽ>14|E t8=4$)<{ԵjH">w}؆VlE4Mܔh_GpMnNCfoaU)ׄ <NYsDAmqI3J[?M2. 7[年) gXUe c"@PyL%wGhKF-~5+`,,cmF*ō}nţZըlf/{HԾbm3\'H?Ex28*mRK›LFL?Y 92j#݅g5ǹ y;oJS ȍ-  US͐z@7K(W1A 3T K+ҖC~7l]mkIմLBOW- Y* ͔8W)c} H2O!౑xlj%"`<l@'J4U] nZc6.y_S|@\ Y{,Y;#; Ljv#?+ͭ4xu(u߿u ף?23iu@b8؎E.?ڙְ !Yupti ]Kv%);hjbHӌUO!6~}NjWaY3YH+'G,dCaQvM V>x f JYeW?$TɎv1|],!J0D@%~ѝ`'~NѼR|K9L .xߡZйbJwr^l\ύ%U.nf! ^ENr1pM ɥ*> أ`Epm:!2֏ZoN]#\.|U': 滔 mRm,8"7g3 OԼ&6@v 6"1d=mtxX7{NOK7>YsK)>Y*)?cVmy`h]zOgkH{J8d6z 7sK}Ook`$iCX#6+A8UB ߉[*7=VmxI%emZ ܪduC;Uk8%Q$-wiL˹Ȫ~'*F͂i1Gh"M>dV4衑:76pg5,H֓$)'~|aqse )dKgh6k{ 1CP?s([uRxc1&wUܮFل`D[ RoB#SV9i=5 :a"4%j?ъ!Eq6 vIO^gsCd4h9HY^"L?G 76QێLv|%i6[HRQ `-FRn04c[Z9WūH szf?s!8BoO, LʌQ]Czד-TEQW#t)^8ATS%%Nj8E#<6[(Uz,k^V}Kِt}0y)[_WаHY&Hq^fQ FPgopTbvkJb殧lQ=C ͿLP^"uk ;)g1RRƚywc!O:];38BZٵkX,H_$6NR(O|<5 [[?kp՚.f.-'owzfEA\Z; ,(Ģ(h=v ɷHx+~A!_1%terw@kmAh&A,ijCb:&4 'PHj2uEy|!c!XԢMP6|b;/w 17\vxHBp؏>!!vT1E1om; l%ed8x#HSZ$vo][$F'yXorņF":-/Z#-VAYIyȧ=]CQћdw6Zx"$t7yRW(ӁE X E!\Z 3כ`0낛pdVb!ڙq %QW(0e)Ɵ b 4ϳB&k!K  PȜ@̺;ʚayMoAu%<k7 =cp R7g'zj}M7l]rF iѻ} gͲbFC|m<3ءH}D^@x&KGD[$6EoDȣ #ȫa f0SQ%&i揸p+{`^xš =ERG]smـI-e nKj)0-\.R6s[2յFH? ?˒~+jG$,.V]xSQ\3 "_K.F F4frs$;{B} iʤ?_~ʎ))))ּ-ǭvʴ7ݸťqU zqxꪈ TX˔Я(9J5'ߌao^9[j"JL#9yѥ }oiy ki !q16!yJ(n&4i 7aQ+6΅Z цp}T^kZ]2(ۗ- /i&!j<~"\ md>4dtMyIKpog!PaU/=J{1I0\#Coy?v|yZA,6#L,p 'IǽIE4vw#lR 7bҫ規Nl˙k$+}gNYqL <+/m{ᖩu|* yvT3$#JpfpZ^3l8 BvEn.Ưx'3nYa>dm7'!B5tNЈELV}SْM70&?S~r\H Ԓ3y%(YޏM_vj1+>T>BA)ڴykGv\TksDBK7A(}#s@m>2+0X:nn7W0b!E.B> ~l-SeAvŭ ,8GsA^\/ֵ!iT|pϚKyw bZk{g.fR ,-|u wawYv5t;>v  PeSfp24bGԠo^H~GS T/L_:nʛ1 $AWn`ޏp,ݙa/[7erϝ%8uUi`l5l,h$KS.b!;b+ѽq=?$u (ƫx &*oԕ=1z_ɘz HEX(liT*R1d5xVg=55*P0fap6:ՙyPXU/,]v/M3j} !}49["&UDg^wĪ4aϣSVWU)t#:hI(oh h& -' 4ơ|Jq/F \z!Qȉq0'LD\K#iCskRֵ%RA}*醸M2UӋ[P(cO|ȯoD盧@H }6S*-w).Ϋ/ADUb֮ F |ͨú[ BIRnΆfA?$KP#setn(XrNCk#{4oiۡHّvV+" #Pu L1QA1JB$A$.%De*TSˇzX B_zd \6!0­N( zI  q$H"Cqͅ1ƖyNJ΢?'vn 3+zGX.amy >FNLq^tMA0a\> E폄P&. 7h;ٿ "ہ1&ʒ-M<q=Un8gAem&|aI%Q=dр Aa͜u:Xaپ= @B?$OuVsӅJ2UMxrd1.fΤFY&?ֈpA|m7L&8E>wagL>f#/ʮ%/^nQ\:P1\yK~`n4@m#ƽ矫`JxpX)u۸NNA{<,kȌ8,6)E-lΗ(x;({Zc4>71ۀQF86=ő}%XG/&'kL2Wh{M6ÊIGrwli7v4G3pm} !O<4/{ 'lZ B3&ޤWz%~EPrkHfp?)RQ%vp#Ea^~d'"Lғg:(Nb`$kΩQʉ\gLW@ KT*%CVyY$4ْ{{qR,7ó>mNPpϟHMASz#A",,ClP P fA-g@Z6&wbbV]7ף$hA"qfwh3o!,UO:1"eCljVhoFd g<+%)dLh۽5˧O =㜘R&: e٬ug#!Ll*4T!X]}_x[ %6wd 9#EAr"ʚamu| D{'Ǡ\i-`DCqWp ̥x(xm/q4D͵DvUR$Ok.+T7?;]iQJIòo_!qj@f1IJUM\W1K~I:^o.n8J=`%QzH[˞bL#\7*ڎrl^%%!g@bžz]3xjAkMac37q/ !p|< Q8 {O#u13ģ$;ֈDpN "C#ofSwd_Ma3:q'8R&{خEm;[)B%LKd \smblf# ..3±dxW-lӎgšgq#`udç! ܙEdtV@8W\A`v} P3"h sqwX}fy_Q} zBVpQ9Pȷ_-;B6' w&.k"^|˱jyg.nͫ^2w$>=ϩi#Ϛ~e52E=pOy΋AeĦozs?)މ9qR'vw 4yUNk8og oTb>؏HڜZ@u)[4pWn:ϼOl޳tw$a,wACiclc+*dwIRRDmW )HN9!M:nKݢXL$j.>-8O '[:㧍`^A?T2Ue="wr_ݓzſ.MbП$bLlOL-k{٤\(||(l(f\xw}%$Gj{]MZ,1S1u3ҥavaw}pۻ4:s9oR,~+3Ѷx }47F.HU[6*kZ)=JG8hvO(}#}E7j`4QQl kUɌ׽ ԭj?j zkax2b=eW-nLOѩxLk#DpJ!H:_Uֳ5t6,i+YESzI(zbH|q7 ʤOz'gݔFDv p1[B"_׋L 7\^XbD\ M94}~awҦZY_:~U(?wfZhݝmXb6Z^Z" ke N^*ni2W.[R3PUB›L2z@햧 ejPfʹ"y5 2᧌k⋴j L≥D9hEҹc*j?p2_aҼZO-&ÛSc FSWL9^ɭ[H]60UݱT;1'Mr]|ߴ]S D8B㎷ps"n`'4%\ޘ'iRQOgئ8qC:ʽiTm3ܰ'TPiO=Ǧx%3Uh1sxS2>;)iYQjdhT?ڳQ@Ds?#$4N+6(g=AMa6%I߲Ws$c2=HѨal3F(J8_H2܇ ؆%鲟gn @ȋ{/p$9= fl3X-̗ߡ [IY !Ƽ.vmAYFk.oq':X~ \N}EYt5,JKOcdtcHhq&Mr<'G땦RǍ+vD/oYN/WɎD%Pe~u.@.F D#O/A} imIREkW_)r-[x̝&O *м~3?YZକ*t\"moW]L2u5D{NuxsG-3R |<ΊeTpA ;*;3y rLRK@p<(!mil٤?NWCɼ ⻖lK)3+SpR_Oq%/L.IAfH^;6: R޵qe$Pz4/9?6SN]c9q_PNPF5lm%臡}`~َyvb{i"oUBoAEx#zRΟ3IVLeQq _h⋼9[? ^v//gLlI:\'=}fփ@'IcV҈u" Usu5¶$-ִvzBS-t3/ $V಻ź2Si/ V]5DQXm6 \Mozx?dHs^(S 3W v<9P[0|Y$l&05698K=]!ִrXfuV>-+ 71:w|>`"{`}/([azV˻/֍x*]PW9~"?({u)dF˼ d2VR(P_kdx}h)t]eYǗ b-ݴ;?ek2\7jSd Hx$u"]6` (Jɛ=KN'f"%-M9] {ҼE;>f&b +Zq-O&t}NKQ6 pxU⪸%H̟>"¸{-ٱVBJ&_vEN0pQywLk.uon FV?]/X 5ȇCs5P+h ˧뭵@mId }?"hઃ@;gT$Ugv&L$Q*!w@#ꀮ3TG o"la[{ˋ,q{8mt5BA A4tybRf?A͏@<'8 _QȬ %uj4mhLjtQdbXȇzr>ZRq1b h@`T%fEfS`˯0]VZTgYE9MEܺ N>y,'*II3lXc+w @#Q/`njf;x {m_`H=$<^gbw/j )̇AW !t<_^fKgȓ#XnF"9'u izc -2B9;E;IqWl7>Etn!}6sUZHl1縢( ;KZd55ky\H/^[EDDU? 81 ΑXI X$ː,r@t܁f)Yvڬkm"T>;O1@YH 7Țj{H}e2FI1#W`#3QcEC CbWF+XU6^ԧnd'zg ^ З$N*NHDȨPM5=4f4s8/~5 Gͅ-O*.)#n0`krjuMD'lq+Mcc]t^?E˲M4M,%02"rǓCŻΉphl?RiP~E*ŕZfGǴ !JէREKbՈ/9jT'1*\Uzj>8wUH#pޏ)ޢ)j\]T:2/cQ Ų^*kXN}s d\g̫N+ЈAIq(=U"Ɗ}#O3֦d\縕]'Nw&Pk!hZW%zqj BN-a"Jk_)c1)AZ|+uR/2i4yY՝:Uj¤fp#o/%h~TIP%Q=m&tfWkx,?v1u #zC[6:>#(<>64B\ԧFeO"ꊅE* -k4uLtV8 y@a@J5cH*| HKwɣm͕=,#5q Hռ'.u5:+Vr1\vBh;s @E㍊K be=Md&?3uvUE+3@VK OhqV5q_oF:kB:/9 <ޖ}s}peVE ]!)O Rp."Co!ΕOWQ {F\rWdo3D'p\a1h)>S,E\MZ޻Q#fp7e_Cz6쎼Ƹ$X!-/&& YZ