Date: Thursday, January 25, 2018 @ 21:32:07
  Author: alucryd
Revision: 286962

upgpkg: firewalld 0.5.0-1

Modified:
  firewalld/trunk/PKGBUILD
  firewalld/trunk/firewalld-arch.patch

----------------------+
 PKGBUILD             |   10 +--
 firewalld-arch.patch |  132 ++++++++++++-------------------------------------
 2 files changed, 40 insertions(+), 102 deletions(-)

Modified: PKGBUILD
===================================================================
--- PKGBUILD    2018-01-25 21:09:07 UTC (rev 286961)
+++ PKGBUILD    2018-01-25 21:32:07 UTC (rev 286962)
@@ -4,7 +4,7 @@
 # Contributor: speed145a <[email protected]>
 
 pkgname=firewalld
-pkgver=0.4.4.6
+pkgver=0.5.0
 pkgrel=1
 pkgdesc='Firewall daemon with D-Bus interface'
 arch=('any')
@@ -22,8 +22,8 @@
         'etc/firewalld/firewalld.conf')
 
source=("firewalld-${pkgver}.tar.gz::https://github.com/t-woerner/firewalld/archive/v${pkgver}.tar.gz";
         'firewalld-arch.patch')
-sha256sums=('a7bf9dd341f3f4c261fa8a8e217160ec815e9dbf32edc25aed44719a2273e94e'
-            '5c0c49e125426d561c4099df639ab6dd7073a6d17ae1c130d235cc2397c568c2')
+sha256sums=('ecd3adb714fe2ead77253d505cf430c6c640f2c088f2a779c0459f399629ab38'
+            '14a05a2f5eccbb6c30e775877706a90fd4ad524cdd13ea76f3a23b09b9d4212e')
 
 prepare() {
   cd firewalld-${pkgver}
@@ -41,8 +41,8 @@
     --localstatedir='/var' \
     --sbindir='/usr/bin' \
     --sysconfdir='/etc' \
-    --with-sysconfigdir='/etc/conf.d' \
-    --disable-schemas-compile
+    --disable-schemas-compile \
+    --disable-sysconfig
   make
 }
 

Modified: firewalld-arch.patch
===================================================================
--- firewalld-arch.patch        2018-01-25 21:09:07 UTC (rev 286961)
+++ firewalld-arch.patch        2018-01-25 21:32:07 UTC (rev 286962)
@@ -1,7 +1,7 @@
-diff -rupN firewalld-0.4.3.2.orig/config/firewalld.service.in 
firewalld-0.4.3.2/config/firewalld.service.in
---- firewalld-0.4.3.2.orig/config/firewalld.service.in 2016-08-11 
13:51:30.222192739 +0200
-+++ firewalld-0.4.3.2/config/firewalld.service.in      2016-08-11 
14:00:09.330037527 +0200
-@@ -9,7 +9,7 @@ Conflicts=iptables.service ip6tables.ser
+diff -rupN firewalld-0.5.0.orig/config/firewalld.service.in 
firewalld-0.5.0/config/firewalld.service.in
+--- firewalld-0.5.0.orig/config/firewalld.service.in   2018-01-25 
22:14:21.796600916 +0100
++++ firewalld-0.5.0/config/firewalld.service.in        2018-01-25 
22:15:29.448820083 +0100
+@@ -8,7 +8,7 @@ Conflicts=iptables.service ip6tables.ser
  Documentation=man:firewalld(1)
  
  [Service]
@@ -10,10 +10,10 @@
  ExecStart=@sbindir@/firewalld --nofork --nopid $FIREWALLD_ARGS
  ExecReload=/bin/kill -HUP $MAINPID
  # supress to log debug and error output also to /var/log/messages
-diff -rupN firewalld-0.4.3.2.orig/config/Makefile.am 
firewalld-0.4.3.2/config/Makefile.am
---- firewalld-0.4.3.2.orig/config/Makefile.am  2016-08-11 13:51:30.222192739 
+0200
-+++ firewalld-0.4.3.2/config/Makefile.am       2016-08-11 14:00:59.039831081 
+0200
-@@ -205,12 +205,12 @@ firewalld.service: firewalld.service.in
+diff -rupN firewalld-0.5.0.orig/config/Makefile.am 
firewalld-0.5.0/config/Makefile.am
+--- firewalld-0.5.0.orig/config/Makefile.am    2018-01-25 22:14:21.796600916 
+0100
++++ firewalld-0.5.0/config/Makefile.am 2018-01-25 22:17:25.497003199 +0100
+@@ -308,12 +308,12 @@ firewalld-sysctls.conf: firewalld-sysctl
        $(edit) $< >$@
  
  install-sysconfig:
@@ -30,45 +30,21 @@
  
  install-rpmmacros:
        $(MKDIR_P) $(DESTDIR)$(prefix)/lib/rpm/macros.d
-diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewall-cmd.xml 
firewalld-0.4.3.2/doc/xml/firewall-cmd.xml
---- firewalld-0.4.3.2.orig/doc/xml/firewall-cmd.xml    2016-08-11 
13:51:30.235526017 +0200
-+++ firewalld-0.4.3.2/doc/xml/firewall-cmd.xml 2016-08-11 14:02:21.729487648 
+0200
-@@ -852,7 +852,7 @@ For interfaces that are not under contro
-           </para>
-           <para>
-             As a end user you don't need this in most cases, because 
NetworkManager (or legacy network service) adds interfaces into zones 
automatically (according to <option>ZONE=</option> option from 
ifcfg-<replaceable>interface</replaceable> file) if 
<replaceable>NM_CONTROLLED=no</replaceable> is not set.
--            You should do it only if there's no 
/etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file.
-+            You should do it only if there's no 
/etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file.
-             If there is such file and you add interface to zone with this 
<option>--add-interface</option> option, make sure the zone is the same in both 
cases, otherwise the behaviour would be undefined.
-             Please also have a look at the 
<citerefentry><refentrytitle>firewalld</refentrytitle><manvolnum>1</manvolnum></citerefentry>
 man page in the <replaceable>Concepts</replaceable> section.
-             For permanent association of interface with a zone, see also 'How 
to set or change a zone for a connection?' in 
<citerefentry><refentrytitle>firewalld.zones</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
-diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewallctl.xml 
firewalld-0.4.3.2/doc/xml/firewallctl.xml
---- firewalld-0.4.3.2.orig/doc/xml/firewallctl.xml     2016-08-11 
13:51:30.235526017 +0200
-+++ firewalld-0.4.3.2/doc/xml/firewallctl.xml  2016-08-11 14:01:52.559608802 
+0200
-@@ -548,7 +548,7 @@ For interfaces that are not under contro
-           </para>
-           <para>
-             As a end user you don't need to create or change zone bindings of 
interfaces in most cases, because NetworkManager (or legacy network service) 
adds interfaces into zones automatically (according to <option>ZONE=</option> 
option from ifcfg-<replaceable>interface</replaceable> file) if 
<replaceable>NM_CONTROLLED=no</replaceable> is not set.
--            You should do it only if there's no 
/etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file.
-+            You should do it only if there's no 
/etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file.
-             If there is such file and you add interface to zone with this 
<option>--add-interface</option> option, make sure the zone is the same in both 
cases, otherwise the behaviour would be undefined.
-             Please also have a look at the 
<citerefentry><refentrytitle>firewalld</refentrytitle><manvolnum>1</manvolnum></citerefentry>
 man page in the <replaceable>Concepts</replaceable> section.
-             For permanent association of interface with a zone, see also 'How 
to set or change a zone for a connection?' in 
<citerefentry><refentrytitle>firewalld.zones</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
-diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewalld.xml 
firewalld-0.4.3.2/doc/xml/firewalld.xml
---- firewalld-0.4.3.2.orig/doc/xml/firewalld.xml       2016-08-11 
13:51:30.235526017 +0200
-+++ firewalld-0.4.3.2/doc/xml/firewalld.xml    2016-08-11 14:03:07.599297125 
+0200
-@@ -130,7 +130,7 @@
-     </para>
-     <para>
-       You can add these interfaces to a zone with <command>firewall-cmd 
[--permanent] --zone=<replaceable>zone</replaceable> 
--add-interface=<replaceable>interface</replaceable></command>.
--      If there is a 
/etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file, 
firewalld tries to change the ZONE=<replaceable>zone</replaceable> setting in 
this file.
-+      If there is a 
/etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file, 
firewalld tries to change the ZONE=<replaceable>zone</replaceable> setting in 
this file.
-     </para>
-     <para>
-       If firewalld gets reloaded, it will restore the interface bindings that 
were in place before reloading to keep interface bindings stable in the case of 
NetworkManager uncontrolled interfaces.
-diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewall-offline-cmd.xml 
firewalld-0.4.3.2/doc/xml/firewall-offline-cmd.xml
---- firewalld-0.4.3.2.orig/doc/xml/firewall-offline-cmd.xml    2016-08-11 
13:51:30.235526017 +0200
-+++ firewalld-0.4.3.2/doc/xml/firewall-offline-cmd.xml 2016-08-11 
14:02:41.129407071 +0200
+diff -rupN firewalld-0.5.0.orig/configure.ac firewalld-0.5.0/configure.ac
+--- firewalld-0.5.0.orig/configure.ac  2018-01-25 22:14:21.796600916 +0100
++++ firewalld-0.5.0/configure.ac       2018-01-25 22:18:20.346179951 +0100
+@@ -71,7 +71,7 @@ AC_SUBST(BASHCOMPLETIONDIR)
+ 
+ AC_ARG_WITH([ifcfgdir],
+        AS_HELP_STRING([--with-ifcfgdir=DIR], [The ifcfg configuration 
directory]),
+-       [IFCFGDIR=$withval], [IFCFGDIR="/etc/sysconfig/network-scripts"])
++       [IFCFGDIR=$withval], [IFCFGDIR="/etc/conf.d/network-scripts"])
+ AC_SUBST(IFCFGDIR)
+ 
+ # Extend PATH to include /sbin etc in case we are building as non-root
+diff -rupN firewalld-0.5.0.orig/doc/xml/firewall-offline-cmd.xml 
firewalld-0.5.0/doc/xml/firewall-offline-cmd.xml
+--- firewalld-0.5.0.orig/doc/xml/firewall-offline-cmd.xml      2018-01-25 
22:14:21.799934194 +0100
++++ firewalld-0.5.0/doc/xml/firewall-offline-cmd.xml   2018-01-25 
22:18:43.412506403 +0100
 @@ -68,7 +68,7 @@
    <refsect1 id="options">
      <title>Options</title>
@@ -76,45 +52,24 @@
 -      If no options are given, configuration from 
<command>/etc/sysconfig/system-config-firewall</command> will be migrated.
 +      If no options are given, configuration from 
<command>/etc/conf.d/system-config-firewall</command> will be migrated.
      </para>
+ 
      <para>
-       The following options are supported:
-diff -rupN firewalld-0.4.3.2.orig/firewalld.spec 
firewalld-0.4.3.2/firewalld.spec
---- firewalld-0.4.3.2.orig/firewalld.spec      2016-08-11 13:51:30.222192739 
+0200
-+++ firewalld-0.4.3.2/firewalld.spec   2016-08-11 14:03:48.909125535 +0200
-@@ -222,7 +222,7 @@ fi
- %dir %{_datadir}/firewalld/tests
- %{_datadir}/firewalld/tests
- %defattr(0644,root,root)
--%config(noreplace) %{_sysconfdir}/sysconfig/firewalld
-+%config(noreplace) %{_sysconfdir}/conf.d/firewalld
- #%attr(0755,root,root) %{_initrddir}/firewalld
- %{_unitdir}/firewalld.service
- %config(noreplace) %{_sysconfdir}/dbus-1/system.d/FirewallD.conf
-diff -rupN firewalld-0.4.3.2.orig/src/firewall/config/__init__.py.in 
firewalld-0.4.3.2/src/firewall/config/__init__.py.in
---- firewalld-0.4.3.2.orig/src/firewall/config/__init__.py.in  2016-08-11 
13:51:30.275525851 +0200
-+++ firewalld-0.4.3.2/src/firewall/config/__init__.py.in       2016-08-11 
14:05:29.355374948 +0200
-@@ -85,7 +85,7 @@ FIREWALLD_DIRECT = ETC_FIREWALLD + '/dir
+diff -rupN firewalld-0.5.0.orig/src/firewall/config/__init__.py.in 
firewalld-0.5.0/src/firewall/config/__init__.py.in
+--- firewalld-0.5.0.orig/src/firewall/config/__init__.py.in    2018-01-25 
22:14:21.803267471 +0100
++++ firewalld-0.5.0/src/firewall/config/__init__.py.in 2018-01-25 
22:19:44.971614279 +0100
+@@ -96,7 +96,7 @@ FIREWALLD_PIDFILE = "/var/run/firewalld.
  
- LOCKDOWN_WHITELIST = ETC_FIREWALLD + '/lockdown-whitelist.xml'
+ FIREWALLD_TEMPDIR = '/run/firewalld'
  
 -SYSCONFIGDIR = '/etc/sysconfig'
 +SYSCONFIGDIR = '/etc/conf.d'
- IFCFGDIR = SYSCONFIGDIR + '/network-scripts'
+ IFCFGDIR = "@IFCFGDIR@"
  
  SYSCTL_CONFIG = '/etc/sysctl.conf'
-diff -rupN firewalld-0.4.3.2.orig/src/tests/firewall-offline-cmd_test.sh 
firewalld-0.4.3.2/src/tests/firewall-offline-cmd_test.sh
---- firewalld-0.4.3.2.orig/src/tests/firewall-offline-cmd_test.sh      
2016-08-11 13:51:30.302192407 +0200
-+++ firewalld-0.4.3.2/src/tests/firewall-offline-cmd_test.sh   2016-08-11 
14:04:51.418865874 +0200
-@@ -176,7 +176,7 @@ assert_good     "--query-forward-port ${
- failures=0
- 
- while true; do
--    read -p "This test overwrites your /etc/firewalld/zones/* and 
/etc/sysconfig/system-config-firewall. Do you want to continue ?" yn
-+    read -p "This test overwrites your /etc/firewalld/zones/* and 
/etc/conf.d/system-config-firewall. Do you want to continue ?" yn
-     case $yn in
-         [Yy]* ) break;;
-         [Nn]* ) exit;;
-@@ -201,14 +201,14 @@ fw_port2="port=333:proto=udp:toport=444"
+diff -rupN firewalld-0.5.0.orig/src/tests/legacy/firewall-offline-cmd_test.sh 
firewalld-0.5.0/src/tests/legacy/firewall-offline-cmd_test.sh
+--- firewalld-0.5.0.orig/src/tests/legacy/firewall-offline-cmd_test.sh 
2018-01-25 22:14:21.806600748 +0100
++++ firewalld-0.5.0/src/tests/legacy/firewall-offline-cmd_test.sh      
2018-01-25 22:19:19.201985041 +0100
+@@ -218,7 +218,7 @@ fw_port2="port=333:proto=udp:toport=444"
  lokkit_opts="--enabled --addmodule=abc --addmodule=efg --removemodule=xyz
   --trust=${trusted_iface1} --trust=${trusted_iface2}
   --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp
@@ -123,15 +78,7 @@
   --service=${service1} --service=${service2} --remove-service=${service3}
   --block-icmp=${icmp1} --block-icmp=${icmp2}
   --forward-port=if=ippp+:${fw_port1}
-  --forward-port=if=ippp+:${fw_port2}"
- test_lokkit_opts
- 
--cat << EOF > /etc/sysconfig/system-config-firewall
-+cat << EOF > /etc/conf.d/system-config-firewall
- --enabled
- --addmodule=abc
- --addmodule=efg
-@@ -219,7 +219,7 @@ cat << EOF > /etc/sysconfig/system-confi
+@@ -236,7 +236,7 @@ cat << EOF > ./system-config-firewall
  --masq=tap+
  --port=7:tcp
  --port=666:udp
@@ -140,12 +87,3 @@
  --service=${service1}
  --service=${service2}
  --remove-service=${service3}
-@@ -229,7 +229,7 @@ cat << EOF > /etc/sysconfig/system-confi
- --forward-port=if=ippp+:${fw_port2}
- EOF
- 
--# running firewall-offline-cmd without options should import 
/etc/sysconfig/system-config-firewall
-+# running firewall-offline-cmd without options should import 
/etc/conf.d/system-config-firewall
- lokkit_opts=""
- test_lokkit_opts
- 

Reply via email to