Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package firewalld for openSUSE:Factory 
checked in at 2022-11-05 14:46:45
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/firewalld (Old)
 and      /work/SRC/openSUSE:Factory/.firewalld.new.2275 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "firewalld"

Sat Nov  5 14:46:45 2022 rev:74 rq:1033616 version:1.2.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/firewalld/firewalld.changes      2022-09-02 
21:56:41.784318765 +0200
+++ /work/SRC/openSUSE:Factory/.firewalld.new.2275/firewalld.changes    
2022-11-05 14:46:50.530619427 +0100
@@ -1,0 +2,20 @@
+Thu Nov  3 15:03:25 UTC 2022 - Paolo Stivanin <[email protected]>
+
+- Update to 1.2.1:
+  * fix(modules): don't error if /proc/modules is missing (a1f091d)
+  * fix(readme): format optional <ver> (03e61f2)
+  * docs: add protocols to rich and zones (191cea4)
+  * docs(policy): add priority attribute to rule (616ed7c)
+  * fix(runtimeToPermanent): errors for interfaces not in zone (6b5a70b)
+  * fix(failsafe): log exception on fatal failure (af1b8f0)
+  * fix(ipset): defer native ipset creation if nftables (ae0ded4)
+  * fix(nftables): drop invalid packets before zone dispatch (dc972ae)
+  * fix(iptables): drop invalid packets before zone dispatch (83a4608)
+  * fix(policies): Splitting interfaces with wildcards (3806e79)
+  * fix(ipset): exception on overlap checking empty set (bfe827f)
+  * fix(bash): fix ipset commands autocompletion (742669b)
+  * docs(README): fix typo (e40b100)
+  * fix(treewide): misc typos (d121f0c)
+  * fix: firewalld.conf: trim trailing whitespace (21809ed)
+
+-------------------------------------------------------------------

Old:
----
  firewalld-1.2.0.tar.gz

New:
----
  firewalld-1.2.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ firewalld.spec ++++++
--- /var/tmp/diff_new_pack.0J7BJE/_old  2022-11-05 14:46:51.346624187 +0100
+++ /var/tmp/diff_new_pack.0J7BJE/_new  2022-11-05 14:46:51.354624234 +0100
@@ -27,7 +27,7 @@
 %global modprobe_d_files firewalld-sysctls.conf
 
 Name:           firewalld
-Version:        1.2.0
+Version:        1.2.1
 Release:        0
 Summary:        A firewall daemon with D-Bus interface providing a dynamic 
firewall
 License:        GPL-2.0-or-later

++++++ 0002-Disable-FlushAllOnReload-option.patch ++++++
--- /var/tmp/diff_new_pack.0J7BJE/_old  2022-11-05 14:46:51.382624397 +0100
+++ /var/tmp/diff_new_pack.0J7BJE/_new  2022-11-05 14:46:51.386624421 +0100
@@ -14,11 +14,11 @@
  src/firewall/config/__init__.py.in | 2 +-
  3 files changed, 4 insertions(+), 4 deletions(-)
 
-diff --git a/config/firewalld.conf b/config/firewalld.conf
-index 532f0452..e789f2a7 100644
---- a/config/firewalld.conf
-+++ b/config/firewalld.conf
-@@ -52,8 +52,8 @@ FirewallBackend=nftables
+Index: firewalld-1.2.1/config/firewalld.conf
+===================================================================
+--- firewalld-1.2.1.orig/config/firewalld.conf
++++ firewalld-1.2.1/config/firewalld.conf
+@@ -63,8 +63,8 @@ FirewallBackend=nftables
  # configuration was retained during a reload, namely; interface to zone
  # assignment, and direct rules. This was confusing to users. To get the old
  # behavior set this to "no".
@@ -29,11 +29,11 @@
  
  # RFC3964_IPv4
  # As per RFC 3964, filter IPv6 traffic with 6to4 destination addresses that
-diff --git a/doc/xml/firewalld.conf.xml b/doc/xml/firewalld.conf.xml
-index fcfbfd2b..8415ba3e 100644
---- a/doc/xml/firewalld.conf.xml
-+++ b/doc/xml/firewalld.conf.xml
-@@ -166,7 +166,7 @@
+Index: firewalld-1.2.1/doc/xml/firewalld.conf.xml
+===================================================================
+--- firewalld-1.2.1.orig/doc/xml/firewalld.conf.xml
++++ firewalld-1.2.1/doc/xml/firewalld.conf.xml
+@@ -190,7 +190,7 @@
                  runtime configuration was retained during a reload, namely;
                  interface to zone assignment, and direct rules. This was
                  confusing to users. To get the old behavior set this to "no".
@@ -42,11 +42,11 @@
                  </para>
              </listitem>
          </varlistentry>
-diff --git a/src/firewall/config/__init__.py.in 
b/src/firewall/config/__init__.py.in
-index e875e849..df6f449b 100644
---- a/src/firewall/config/__init__.py.in
-+++ b/src/firewall/config/__init__.py.in
-@@ -131,6 +131,6 @@ FALLBACK_INDIVIDUAL_CALLS = False
+Index: firewalld-1.2.1/src/firewall/config/__init__.py.in
+===================================================================
+--- firewalld-1.2.1.orig/src/firewall/config/__init__.py.in
++++ firewalld-1.2.1/src/firewall/config/__init__.py.in
+@@ -132,6 +132,6 @@ FALLBACK_INDIVIDUAL_CALLS = False
  FALLBACK_LOG_DENIED = "off"
  FALLBACK_AUTOMATIC_HELPERS = "no"
  FALLBACK_FIREWALL_BACKEND = "nftables"
@@ -54,7 +54,4 @@
 +FALLBACK_FLUSH_ALL_ON_RELOAD = False
  FALLBACK_RFC3964_IPV4 = True
  FALLBACK_ALLOW_ZONE_DRIFTING = False
--- 
-2.30.0
-
 

++++++ firewalld-1.2.0.tar.gz -> firewalld-1.2.1.tar.gz ++++++
++++ 149332 lines of diff (skipped)

Reply via email to