Date: Saturday, August 20, 2016 @ 20:01:08 Author: alucryd Revision: 187208
archrelease: copy trunk to community-any Added: firewalld/repos/community-any/PKGBUILD (from rev 187207, firewalld/trunk/PKGBUILD) firewalld/repos/community-any/firewalld-arch.patch (from rev 187207, firewalld/trunk/firewalld-arch.patch) Deleted: firewalld/repos/community-any/PKGBUILD firewalld/repos/community-any/firewalld-arch.patch ----------------------+ PKGBUILD | 110 ++++++++--------- firewalld-arch.patch | 302 ++++++++++++++++++++++++------------------------- 2 files changed, 206 insertions(+), 206 deletions(-) Deleted: PKGBUILD =================================================================== --- PKGBUILD 2016-08-20 20:00:55 UTC (rev 187207) +++ PKGBUILD 2016-08-20 20:01:08 UTC (rev 187208) @@ -1,55 +0,0 @@ -# $Id$ -# Maintainer: Maxime Gauduin <aluc...@archlinux.org> -# Contributor: unikum <unikum...@gmail.com> -# Contributor: speed145a <jonat...@tagchapter.com> - -pkgname=firewalld -pkgver=0.4.3.2 -pkgrel=1 -pkgdesc='Firewall daemon with D-Bus interface' -arch=('any') -url='https://github.com/t-woerner/firewalld' -license=('GPL2') -depends=('dbus-glib' 'dconf' 'ebtables' 'hicolor-icon-theme' 'ipset' 'iptables' - 'python-slip') -makedepends=('docbook-xsl' 'intltool') -optdepends=('bash-completion: bash completion' - 'gtk3: firewall-config' - 'libnm-glib: firewall-config and firewall-applet' - 'libnotify: firewall-applet' - 'python-pyqt4: firewall-applet') -backup=('etc/conf.d/firewalld' - 'etc/firewalld/firewalld.conf') -source=("firewalld-${pkgver}.tar.gz::https://github.com/t-woerner/firewalld/archive/v${pkgver}.tar.gz" - 'firewalld-arch.patch') -sha256sums=('6a5ef24f5fde6dae105d575f0ef219c64d4bbefe2bf1dd024257903d2f5046b8' - '5c0c49e125426d561c4099df639ab6dd7073a6d17ae1c130d235cc2397c568c2') - -prepare() { - cd firewalld-${pkgver} - - patch -Np1 -i ../firewalld-arch.patch - - ./autogen.sh -} - -build() { - cd firewalld-${pkgver} - - ./configure \ - --prefix='/usr' \ - --localstatedir='/var' \ - --sbindir='/usr/bin' \ - --sysconfdir='/etc' \ - --with-sysconfigdir='/etc/conf.d' \ - --disable-schemas-compile - make -} - -package() { - cd firewalld-${pkgver} - - make DESTDIR="${pkgdir}" install -} - -# vim: ts=2 sw=2 et: Copied: firewalld/repos/community-any/PKGBUILD (from rev 187207, firewalld/trunk/PKGBUILD) =================================================================== --- PKGBUILD (rev 0) +++ PKGBUILD 2016-08-20 20:01:08 UTC (rev 187208) @@ -0,0 +1,55 @@ +# $Id$ +# Maintainer: Maxime Gauduin <aluc...@archlinux.org> +# Contributor: unikum <unikum...@gmail.com> +# Contributor: speed145a <jonat...@tagchapter.com> + +pkgname=firewalld +pkgver=0.4.3.3 +pkgrel=1 +pkgdesc='Firewall daemon with D-Bus interface' +arch=('any') +url='https://github.com/t-woerner/firewalld' +license=('GPL2') +depends=('dbus-glib' 'dconf' 'ebtables' 'hicolor-icon-theme' 'ipset' 'iptables' + 'python-slip') +makedepends=('docbook-xsl' 'intltool') +optdepends=('bash-completion: bash completion' + 'gtk3: firewall-config' + 'libnm-glib: firewall-config and firewall-applet' + 'libnotify: firewall-applet' + 'python-pyqt4: firewall-applet') +backup=('etc/conf.d/firewalld' + 'etc/firewalld/firewalld.conf') +source=("firewalld-${pkgver}.tar.gz::https://github.com/t-woerner/firewalld/archive/v${pkgver}.tar.gz" + 'firewalld-arch.patch') +sha256sums=('92111a40a6602984ba4e1917cd7ec6f80cc1a277c9a50d93d7f57bfecc2c8d98' + '5c0c49e125426d561c4099df639ab6dd7073a6d17ae1c130d235cc2397c568c2') + +prepare() { + cd firewalld-${pkgver} + + patch -Np1 -i ../firewalld-arch.patch + + ./autogen.sh +} + +build() { + cd firewalld-${pkgver} + + ./configure \ + --prefix='/usr' \ + --localstatedir='/var' \ + --sbindir='/usr/bin' \ + --sysconfdir='/etc' \ + --with-sysconfigdir='/etc/conf.d' \ + --disable-schemas-compile + make +} + +package() { + cd firewalld-${pkgver} + + make DESTDIR="${pkgdir}" install +} + +# vim: ts=2 sw=2 et: Deleted: firewalld-arch.patch =================================================================== --- firewalld-arch.patch 2016-08-20 20:00:55 UTC (rev 187207) +++ firewalld-arch.patch 2016-08-20 20:01:08 UTC (rev 187208) @@ -1,151 +0,0 @@ -diff -rupN firewalld-0.4.3.2.orig/config/firewalld.service.in firewalld-0.4.3.2/config/firewalld.service.in ---- firewalld-0.4.3.2.orig/config/firewalld.service.in 2016-08-11 13:51:30.222192739 +0200 -+++ firewalld-0.4.3.2/config/firewalld.service.in 2016-08-11 14:00:09.330037527 +0200 -@@ -9,7 +9,7 @@ Conflicts=iptables.service ip6tables.ser - Documentation=man:firewalld(1) - - [Service] --EnvironmentFile=-/etc/sysconfig/firewalld -+EnvironmentFile=-/etc/conf.d/firewalld - ExecStart=@sbindir@/firewalld --nofork --nopid $FIREWALLD_ARGS - ExecReload=/bin/kill -HUP $MAINPID - # supress to log debug and error output also to /var/log/messages -diff -rupN firewalld-0.4.3.2.orig/config/Makefile.am firewalld-0.4.3.2/config/Makefile.am ---- firewalld-0.4.3.2.orig/config/Makefile.am 2016-08-11 13:51:30.222192739 +0200 -+++ firewalld-0.4.3.2/config/Makefile.am 2016-08-11 14:00:59.039831081 +0200 -@@ -205,12 +205,12 @@ firewalld.service: firewalld.service.in - $(edit) $< >$@ - - install-sysconfig: -- $(MKDIR_P) $(DESTDIR)$(sysconfdir)/sysconfig -- $(INSTALL_DATA) $(srcdir)/firewalld.sysconfig $(DESTDIR)$(sysconfdir)/sysconfig/firewalld -+ $(MKDIR_P) $(DESTDIR)$(sysconfdir)/conf.d -+ $(INSTALL_DATA) $(srcdir)/firewalld.sysconfig $(DESTDIR)$(sysconfdir)/conf.d/firewalld - - uninstall-sysconfig: -- rm -f $(DESTDIR)$(sysconfdir)/sysconfig/firewalld -- rmdir $(DESTDIR)$(sysconfdir)/sysconfig || : -+ rm -f $(DESTDIR)$(sysconfdir)/conf.d/firewalld -+ rmdir $(DESTDIR)$(sysconfdir)/conf.d || : - - install-rpmmacros: - $(MKDIR_P) $(DESTDIR)$(prefix)/lib/rpm/macros.d -diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewall-cmd.xml firewalld-0.4.3.2/doc/xml/firewall-cmd.xml ---- firewalld-0.4.3.2.orig/doc/xml/firewall-cmd.xml 2016-08-11 13:51:30.235526017 +0200 -+++ firewalld-0.4.3.2/doc/xml/firewall-cmd.xml 2016-08-11 14:02:21.729487648 +0200 -@@ -852,7 +852,7 @@ For interfaces that are not under contro - </para> - <para> - As a end user you don't need this in most cases, because NetworkManager (or legacy network service) adds interfaces into zones automatically (according to <option>ZONE=</option> option from ifcfg-<replaceable>interface</replaceable> file) if <replaceable>NM_CONTROLLED=no</replaceable> is not set. -- You should do it only if there's no /etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file. -+ You should do it only if there's no /etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file. - If there is such file and you add interface to zone with this <option>--add-interface</option> option, make sure the zone is the same in both cases, otherwise the behaviour would be undefined. - Please also have a look at the <citerefentry><refentrytitle>firewalld</refentrytitle><manvolnum>1</manvolnum></citerefentry> man page in the <replaceable>Concepts</replaceable> section. - For permanent association of interface with a zone, see also 'How to set or change a zone for a connection?' in <citerefentry><refentrytitle>firewalld.zones</refentrytitle><manvolnum>5</manvolnum></citerefentry>. -diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewallctl.xml firewalld-0.4.3.2/doc/xml/firewallctl.xml ---- firewalld-0.4.3.2.orig/doc/xml/firewallctl.xml 2016-08-11 13:51:30.235526017 +0200 -+++ firewalld-0.4.3.2/doc/xml/firewallctl.xml 2016-08-11 14:01:52.559608802 +0200 -@@ -548,7 +548,7 @@ For interfaces that are not under contro - </para> - <para> - As a end user you don't need to create or change zone bindings of interfaces in most cases, because NetworkManager (or legacy network service) adds interfaces into zones automatically (according to <option>ZONE=</option> option from ifcfg-<replaceable>interface</replaceable> file) if <replaceable>NM_CONTROLLED=no</replaceable> is not set. -- You should do it only if there's no /etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file. -+ You should do it only if there's no /etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file. - If there is such file and you add interface to zone with this <option>--add-interface</option> option, make sure the zone is the same in both cases, otherwise the behaviour would be undefined. - Please also have a look at the <citerefentry><refentrytitle>firewalld</refentrytitle><manvolnum>1</manvolnum></citerefentry> man page in the <replaceable>Concepts</replaceable> section. - For permanent association of interface with a zone, see also 'How to set or change a zone for a connection?' in <citerefentry><refentrytitle>firewalld.zones</refentrytitle><manvolnum>5</manvolnum></citerefentry>. -diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewalld.xml firewalld-0.4.3.2/doc/xml/firewalld.xml ---- firewalld-0.4.3.2.orig/doc/xml/firewalld.xml 2016-08-11 13:51:30.235526017 +0200 -+++ firewalld-0.4.3.2/doc/xml/firewalld.xml 2016-08-11 14:03:07.599297125 +0200 -@@ -130,7 +130,7 @@ - </para> - <para> - You can add these interfaces to a zone with <command>firewall-cmd [--permanent] --zone=<replaceable>zone</replaceable> --add-interface=<replaceable>interface</replaceable></command>. -- If there is a /etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file, firewalld tries to change the ZONE=<replaceable>zone</replaceable> setting in this file. -+ If there is a /etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file, firewalld tries to change the ZONE=<replaceable>zone</replaceable> setting in this file. - </para> - <para> - If firewalld gets reloaded, it will restore the interface bindings that were in place before reloading to keep interface bindings stable in the case of NetworkManager uncontrolled interfaces. -diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewall-offline-cmd.xml firewalld-0.4.3.2/doc/xml/firewall-offline-cmd.xml ---- firewalld-0.4.3.2.orig/doc/xml/firewall-offline-cmd.xml 2016-08-11 13:51:30.235526017 +0200 -+++ firewalld-0.4.3.2/doc/xml/firewall-offline-cmd.xml 2016-08-11 14:02:41.129407071 +0200 -@@ -68,7 +68,7 @@ - <refsect1 id="options"> - <title>Options</title> - <para> -- If no options are given, configuration from <command>/etc/sysconfig/system-config-firewall</command> will be migrated. -+ If no options are given, configuration from <command>/etc/conf.d/system-config-firewall</command> will be migrated. - </para> - <para> - The following options are supported: -diff -rupN firewalld-0.4.3.2.orig/firewalld.spec firewalld-0.4.3.2/firewalld.spec ---- firewalld-0.4.3.2.orig/firewalld.spec 2016-08-11 13:51:30.222192739 +0200 -+++ firewalld-0.4.3.2/firewalld.spec 2016-08-11 14:03:48.909125535 +0200 -@@ -222,7 +222,7 @@ fi - %dir %{_datadir}/firewalld/tests - %{_datadir}/firewalld/tests - %defattr(0644,root,root) --%config(noreplace) %{_sysconfdir}/sysconfig/firewalld -+%config(noreplace) %{_sysconfdir}/conf.d/firewalld - #%attr(0755,root,root) %{_initrddir}/firewalld - %{_unitdir}/firewalld.service - %config(noreplace) %{_sysconfdir}/dbus-1/system.d/FirewallD.conf -diff -rupN firewalld-0.4.3.2.orig/src/firewall/config/__init__.py.in firewalld-0.4.3.2/src/firewall/config/__init__.py.in ---- firewalld-0.4.3.2.orig/src/firewall/config/__init__.py.in 2016-08-11 13:51:30.275525851 +0200 -+++ firewalld-0.4.3.2/src/firewall/config/__init__.py.in 2016-08-11 14:05:29.355374948 +0200 -@@ -85,7 +85,7 @@ FIREWALLD_DIRECT = ETC_FIREWALLD + '/dir - - LOCKDOWN_WHITELIST = ETC_FIREWALLD + '/lockdown-whitelist.xml' - --SYSCONFIGDIR = '/etc/sysconfig' -+SYSCONFIGDIR = '/etc/conf.d' - IFCFGDIR = SYSCONFIGDIR + '/network-scripts' - - SYSCTL_CONFIG = '/etc/sysctl.conf' -diff -rupN firewalld-0.4.3.2.orig/src/tests/firewall-offline-cmd_test.sh firewalld-0.4.3.2/src/tests/firewall-offline-cmd_test.sh ---- firewalld-0.4.3.2.orig/src/tests/firewall-offline-cmd_test.sh 2016-08-11 13:51:30.302192407 +0200 -+++ firewalld-0.4.3.2/src/tests/firewall-offline-cmd_test.sh 2016-08-11 14:04:51.418865874 +0200 -@@ -176,7 +176,7 @@ assert_good "--query-forward-port ${ - failures=0 - - while true; do -- read -p "This test overwrites your /etc/firewalld/zones/* and /etc/sysconfig/system-config-firewall. Do you want to continue ?" yn -+ read -p "This test overwrites your /etc/firewalld/zones/* and /etc/conf.d/system-config-firewall. Do you want to continue ?" yn - case $yn in - [Yy]* ) break;; - [Nn]* ) exit;; -@@ -201,14 +201,14 @@ fw_port2="port=333:proto=udp:toport=444" - lokkit_opts="--enabled --addmodule=abc --addmodule=efg --removemodule=xyz - --trust=${trusted_iface1} --trust=${trusted_iface2} - --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp -- --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config -+ --custom-rules=ipv4:mangle:/etc/conf.d/ebtables-config - --service=${service1} --service=${service2} --remove-service=${service3} - --block-icmp=${icmp1} --block-icmp=${icmp2} - --forward-port=if=ippp+:${fw_port1} - --forward-port=if=ippp+:${fw_port2}" - test_lokkit_opts - --cat << EOF > /etc/sysconfig/system-config-firewall -+cat << EOF > /etc/conf.d/system-config-firewall - --enabled - --addmodule=abc - --addmodule=efg -@@ -219,7 +219,7 @@ cat << EOF > /etc/sysconfig/system-confi - --masq=tap+ - --port=7:tcp - --port=666:udp ----custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config -+--custom-rules=ipv4:mangle:/etc/conf.d/ebtables-config - --service=${service1} - --service=${service2} - --remove-service=${service3} -@@ -229,7 +229,7 @@ cat << EOF > /etc/sysconfig/system-confi - --forward-port=if=ippp+:${fw_port2} - EOF - --# running firewall-offline-cmd without options should import /etc/sysconfig/system-config-firewall -+# running firewall-offline-cmd without options should import /etc/conf.d/system-config-firewall - lokkit_opts="" - test_lokkit_opts - Copied: firewalld/repos/community-any/firewalld-arch.patch (from rev 187207, firewalld/trunk/firewalld-arch.patch) =================================================================== --- firewalld-arch.patch (rev 0) +++ firewalld-arch.patch 2016-08-20 20:01:08 UTC (rev 187208) @@ -0,0 +1,151 @@ +diff -rupN firewalld-0.4.3.2.orig/config/firewalld.service.in firewalld-0.4.3.2/config/firewalld.service.in +--- firewalld-0.4.3.2.orig/config/firewalld.service.in 2016-08-11 13:51:30.222192739 +0200 ++++ firewalld-0.4.3.2/config/firewalld.service.in 2016-08-11 14:00:09.330037527 +0200 +@@ -9,7 +9,7 @@ Conflicts=iptables.service ip6tables.ser + Documentation=man:firewalld(1) + + [Service] +-EnvironmentFile=-/etc/sysconfig/firewalld ++EnvironmentFile=-/etc/conf.d/firewalld + ExecStart=@sbindir@/firewalld --nofork --nopid $FIREWALLD_ARGS + ExecReload=/bin/kill -HUP $MAINPID + # supress to log debug and error output also to /var/log/messages +diff -rupN firewalld-0.4.3.2.orig/config/Makefile.am firewalld-0.4.3.2/config/Makefile.am +--- firewalld-0.4.3.2.orig/config/Makefile.am 2016-08-11 13:51:30.222192739 +0200 ++++ firewalld-0.4.3.2/config/Makefile.am 2016-08-11 14:00:59.039831081 +0200 +@@ -205,12 +205,12 @@ firewalld.service: firewalld.service.in + $(edit) $< >$@ + + install-sysconfig: +- $(MKDIR_P) $(DESTDIR)$(sysconfdir)/sysconfig +- $(INSTALL_DATA) $(srcdir)/firewalld.sysconfig $(DESTDIR)$(sysconfdir)/sysconfig/firewalld ++ $(MKDIR_P) $(DESTDIR)$(sysconfdir)/conf.d ++ $(INSTALL_DATA) $(srcdir)/firewalld.sysconfig $(DESTDIR)$(sysconfdir)/conf.d/firewalld + + uninstall-sysconfig: +- rm -f $(DESTDIR)$(sysconfdir)/sysconfig/firewalld +- rmdir $(DESTDIR)$(sysconfdir)/sysconfig || : ++ rm -f $(DESTDIR)$(sysconfdir)/conf.d/firewalld ++ rmdir $(DESTDIR)$(sysconfdir)/conf.d || : + + install-rpmmacros: + $(MKDIR_P) $(DESTDIR)$(prefix)/lib/rpm/macros.d +diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewall-cmd.xml firewalld-0.4.3.2/doc/xml/firewall-cmd.xml +--- firewalld-0.4.3.2.orig/doc/xml/firewall-cmd.xml 2016-08-11 13:51:30.235526017 +0200 ++++ firewalld-0.4.3.2/doc/xml/firewall-cmd.xml 2016-08-11 14:02:21.729487648 +0200 +@@ -852,7 +852,7 @@ For interfaces that are not under contro + </para> + <para> + As a end user you don't need this in most cases, because NetworkManager (or legacy network service) adds interfaces into zones automatically (according to <option>ZONE=</option> option from ifcfg-<replaceable>interface</replaceable> file) if <replaceable>NM_CONTROLLED=no</replaceable> is not set. +- You should do it only if there's no /etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file. ++ You should do it only if there's no /etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file. + If there is such file and you add interface to zone with this <option>--add-interface</option> option, make sure the zone is the same in both cases, otherwise the behaviour would be undefined. + Please also have a look at the <citerefentry><refentrytitle>firewalld</refentrytitle><manvolnum>1</manvolnum></citerefentry> man page in the <replaceable>Concepts</replaceable> section. + For permanent association of interface with a zone, see also 'How to set or change a zone for a connection?' in <citerefentry><refentrytitle>firewalld.zones</refentrytitle><manvolnum>5</manvolnum></citerefentry>. +diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewallctl.xml firewalld-0.4.3.2/doc/xml/firewallctl.xml +--- firewalld-0.4.3.2.orig/doc/xml/firewallctl.xml 2016-08-11 13:51:30.235526017 +0200 ++++ firewalld-0.4.3.2/doc/xml/firewallctl.xml 2016-08-11 14:01:52.559608802 +0200 +@@ -548,7 +548,7 @@ For interfaces that are not under contro + </para> + <para> + As a end user you don't need to create or change zone bindings of interfaces in most cases, because NetworkManager (or legacy network service) adds interfaces into zones automatically (according to <option>ZONE=</option> option from ifcfg-<replaceable>interface</replaceable> file) if <replaceable>NM_CONTROLLED=no</replaceable> is not set. +- You should do it only if there's no /etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file. ++ You should do it only if there's no /etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file. + If there is such file and you add interface to zone with this <option>--add-interface</option> option, make sure the zone is the same in both cases, otherwise the behaviour would be undefined. + Please also have a look at the <citerefentry><refentrytitle>firewalld</refentrytitle><manvolnum>1</manvolnum></citerefentry> man page in the <replaceable>Concepts</replaceable> section. + For permanent association of interface with a zone, see also 'How to set or change a zone for a connection?' in <citerefentry><refentrytitle>firewalld.zones</refentrytitle><manvolnum>5</manvolnum></citerefentry>. +diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewalld.xml firewalld-0.4.3.2/doc/xml/firewalld.xml +--- firewalld-0.4.3.2.orig/doc/xml/firewalld.xml 2016-08-11 13:51:30.235526017 +0200 ++++ firewalld-0.4.3.2/doc/xml/firewalld.xml 2016-08-11 14:03:07.599297125 +0200 +@@ -130,7 +130,7 @@ + </para> + <para> + You can add these interfaces to a zone with <command>firewall-cmd [--permanent] --zone=<replaceable>zone</replaceable> --add-interface=<replaceable>interface</replaceable></command>. +- If there is a /etc/sysconfig/network-scripts/ifcfg-<replaceable>interface</replaceable> file, firewalld tries to change the ZONE=<replaceable>zone</replaceable> setting in this file. ++ If there is a /etc/conf.d/network-scripts/ifcfg-<replaceable>interface</replaceable> file, firewalld tries to change the ZONE=<replaceable>zone</replaceable> setting in this file. + </para> + <para> + If firewalld gets reloaded, it will restore the interface bindings that were in place before reloading to keep interface bindings stable in the case of NetworkManager uncontrolled interfaces. +diff -rupN firewalld-0.4.3.2.orig/doc/xml/firewall-offline-cmd.xml firewalld-0.4.3.2/doc/xml/firewall-offline-cmd.xml +--- firewalld-0.4.3.2.orig/doc/xml/firewall-offline-cmd.xml 2016-08-11 13:51:30.235526017 +0200 ++++ firewalld-0.4.3.2/doc/xml/firewall-offline-cmd.xml 2016-08-11 14:02:41.129407071 +0200 +@@ -68,7 +68,7 @@ + <refsect1 id="options"> + <title>Options</title> + <para> +- If no options are given, configuration from <command>/etc/sysconfig/system-config-firewall</command> will be migrated. ++ If no options are given, configuration from <command>/etc/conf.d/system-config-firewall</command> will be migrated. + </para> + <para> + The following options are supported: +diff -rupN firewalld-0.4.3.2.orig/firewalld.spec firewalld-0.4.3.2/firewalld.spec +--- firewalld-0.4.3.2.orig/firewalld.spec 2016-08-11 13:51:30.222192739 +0200 ++++ firewalld-0.4.3.2/firewalld.spec 2016-08-11 14:03:48.909125535 +0200 +@@ -222,7 +222,7 @@ fi + %dir %{_datadir}/firewalld/tests + %{_datadir}/firewalld/tests + %defattr(0644,root,root) +-%config(noreplace) %{_sysconfdir}/sysconfig/firewalld ++%config(noreplace) %{_sysconfdir}/conf.d/firewalld + #%attr(0755,root,root) %{_initrddir}/firewalld + %{_unitdir}/firewalld.service + %config(noreplace) %{_sysconfdir}/dbus-1/system.d/FirewallD.conf +diff -rupN firewalld-0.4.3.2.orig/src/firewall/config/__init__.py.in firewalld-0.4.3.2/src/firewall/config/__init__.py.in +--- firewalld-0.4.3.2.orig/src/firewall/config/__init__.py.in 2016-08-11 13:51:30.275525851 +0200 ++++ firewalld-0.4.3.2/src/firewall/config/__init__.py.in 2016-08-11 14:05:29.355374948 +0200 +@@ -85,7 +85,7 @@ FIREWALLD_DIRECT = ETC_FIREWALLD + '/dir + + LOCKDOWN_WHITELIST = ETC_FIREWALLD + '/lockdown-whitelist.xml' + +-SYSCONFIGDIR = '/etc/sysconfig' ++SYSCONFIGDIR = '/etc/conf.d' + IFCFGDIR = SYSCONFIGDIR + '/network-scripts' + + SYSCTL_CONFIG = '/etc/sysctl.conf' +diff -rupN firewalld-0.4.3.2.orig/src/tests/firewall-offline-cmd_test.sh firewalld-0.4.3.2/src/tests/firewall-offline-cmd_test.sh +--- firewalld-0.4.3.2.orig/src/tests/firewall-offline-cmd_test.sh 2016-08-11 13:51:30.302192407 +0200 ++++ firewalld-0.4.3.2/src/tests/firewall-offline-cmd_test.sh 2016-08-11 14:04:51.418865874 +0200 +@@ -176,7 +176,7 @@ assert_good "--query-forward-port ${ + failures=0 + + while true; do +- read -p "This test overwrites your /etc/firewalld/zones/* and /etc/sysconfig/system-config-firewall. Do you want to continue ?" yn ++ read -p "This test overwrites your /etc/firewalld/zones/* and /etc/conf.d/system-config-firewall. Do you want to continue ?" yn + case $yn in + [Yy]* ) break;; + [Nn]* ) exit;; +@@ -201,14 +201,14 @@ fw_port2="port=333:proto=udp:toport=444" + lokkit_opts="--enabled --addmodule=abc --addmodule=efg --removemodule=xyz + --trust=${trusted_iface1} --trust=${trusted_iface2} + --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp +- --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config ++ --custom-rules=ipv4:mangle:/etc/conf.d/ebtables-config + --service=${service1} --service=${service2} --remove-service=${service3} + --block-icmp=${icmp1} --block-icmp=${icmp2} + --forward-port=if=ippp+:${fw_port1} + --forward-port=if=ippp+:${fw_port2}" + test_lokkit_opts + +-cat << EOF > /etc/sysconfig/system-config-firewall ++cat << EOF > /etc/conf.d/system-config-firewall + --enabled + --addmodule=abc + --addmodule=efg +@@ -219,7 +219,7 @@ cat << EOF > /etc/sysconfig/system-confi + --masq=tap+ + --port=7:tcp + --port=666:udp +---custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config ++--custom-rules=ipv4:mangle:/etc/conf.d/ebtables-config + --service=${service1} + --service=${service2} + --remove-service=${service3} +@@ -229,7 +229,7 @@ cat << EOF > /etc/sysconfig/system-confi + --forward-port=if=ippp+:${fw_port2} + EOF + +-# running firewall-offline-cmd without options should import /etc/sysconfig/system-config-firewall ++# running firewall-offline-cmd without options should import /etc/conf.d/system-config-firewall + lokkit_opts="" + test_lokkit_opts +