Blame SOURCES/0146-RHEL-only-default-to-AllowZoneDrifting-yes.patch

bb602c
From dfa06f76e3088dccf5ac56b4d7f3162830393516 Mon Sep 17 00:00:00 2001
bb602c
From: Eric Garver <eric@garver.life>
bb602c
Date: Tue, 4 Feb 2020 09:12:17 -0500
bb602c
Subject: [PATCH] RHEL only: default to AllowZoneDrifting=yes
bb602c
bb602c
---
bb602c
 config/firewalld.conf               | 4 ++--
bb602c
 doc/xml/firewalld.conf.xml          | 2 +-
bb602c
 doc/xml/firewalld.dbus.xml          | 2 +-
bb602c
 src/firewall/config/__init__.py.in  | 2 +-
bb602c
 src/tests/dbus/firewalld.conf.at    | 4 ++--
bb602c
 src/tests/functions.at              | 1 +
bb602c
 src/tests/regression/rhbz1514043.at | 5 +++++
bb602c
 7 files changed, 13 insertions(+), 7 deletions(-)
bb602c
bb602c
diff --git a/config/firewalld.conf b/config/firewalld.conf
bb602c
index 02be07b9b892..1854f3795e0a 100644
bb602c
--- a/config/firewalld.conf
bb602c
+++ b/config/firewalld.conf
bb602c
@@ -65,5 +65,5 @@ AutomaticHelpers=system
bb602c
 # Note: If "yes" packets will only drift from source based zones to interface
bb602c
 # based zones (including the default zone). Packets never drift from interface
bb602c
 # based zones to other interfaces based zones (including the default zone).
bb602c
-# Possible values; "yes", "no". Defaults to "no".
bb602c
-AllowZoneDrifting=no
bb602c
+# Possible values; "yes", "no". Defaults to "yes".
bb602c
+AllowZoneDrifting=yes
bb602c
diff --git a/doc/xml/firewalld.conf.xml b/doc/xml/firewalld.conf.xml
bb602c
index 9d8017df3112..8dff74152cd1 100644
bb602c
--- a/doc/xml/firewalld.conf.xml
bb602c
+++ b/doc/xml/firewalld.conf.xml
bb602c
@@ -158,7 +158,7 @@
bb602c
                 to interface based zones (including the default zone). Packets
bb602c
                 never drift from interface based zones to other interfaces
bb602c
                 based zones (including the default zone).
bb602c
-                Valid values; "yes", "no". Defaults to "no".
bb602c
+                Valid values; "yes", "no". Defaults to "yes".
bb602c
                 </para>
bb602c
             </listitem>
bb602c
         </varlistentry>
bb602c
diff --git a/doc/xml/firewalld.dbus.xml b/doc/xml/firewalld.dbus.xml
bb602c
index ea0be9cefd1c..afd2c7bba401 100644
bb602c
--- a/doc/xml/firewalld.dbus.xml
bb602c
+++ b/doc/xml/firewalld.dbus.xml
bb602c
@@ -2571,7 +2571,7 @@
bb602c
                 to interface based zones (including the default zone). Packets
bb602c
                 never drift from interface based zones to other interfaces
bb602c
                 based zones (including the default zone).
bb602c
-                Valid values; "yes", "no". Defaults to "no".
bb602c
+                Valid values; "yes", "no". Defaults to "yes".
bb602c
             </para></listitem>
bb602c
           </varlistentry>
bb602c
           <varlistentry id="FirewallD1.config.Properties.AutomaticHelpers">
bb602c
diff --git a/src/firewall/config/__init__.py.in b/src/firewall/config/__init__.py.in
bb602c
index 3926c8fdb3a3..561ea3f34325 100644
bb602c
--- a/src/firewall/config/__init__.py.in
bb602c
+++ b/src/firewall/config/__init__.py.in
bb602c
@@ -128,4 +128,4 @@ FALLBACK_INDIVIDUAL_CALLS = False
bb602c
 FALLBACK_LOG_DENIED = "off"
bb602c
 FALLBACK_AUTOMATIC_HELPERS = "system"
bb602c
 FALLBACK_FIREWALL_BACKEND = "iptables"
bb602c
-FALLBACK_ALLOW_ZONE_DRIFTING = False
bb602c
+FALLBACK_ALLOW_ZONE_DRIFTING = True
bb602c
diff --git a/src/tests/dbus/firewalld.conf.at b/src/tests/dbus/firewalld.conf.at
bb602c
index 0884e21b6368..8ed00f84e158 100644
bb602c
--- a/src/tests/dbus/firewalld.conf.at
bb602c
+++ b/src/tests/dbus/firewalld.conf.at
bb602c
@@ -3,7 +3,7 @@ FWD_START_TEST([firewalld.conf])
bb602c
 dnl Verify defaults over dbus. Should be inline with default firewalld.conf.
bb602c
 IF_HOST_SUPPORTS_NFT_FIB([
bb602c
 DBUS_GETALL([config], [config], 0, [dnl
bb602c
-string "AllowZoneDrifting" : variant string "no"
bb602c
+string "AllowZoneDrifting" : variant string "yes"
bb602c
 string "AutomaticHelpers" : variant string "system"
bb602c
 string "CleanupOnExit" : variant string "no"
bb602c
 string "DefaultZone" : variant string "public"
bb602c
@@ -14,7 +14,7 @@ string "LogDenied" : variant string "off"
bb602c
 string "MinimalMark" : variant int32 100
bb602c
 ])], [
bb602c
 DBUS_GETALL([config], [config], 0, [dnl
bb602c
-string "AllowZoneDrifting" : variant string "no"
bb602c
+string "AllowZoneDrifting" : variant string "yes"
bb602c
 string "AutomaticHelpers" : variant string "system"
bb602c
 string "CleanupOnExit" : variant string "no"
bb602c
 string "DefaultZone" : variant string "public"
bb602c
diff --git a/src/tests/functions.at b/src/tests/functions.at
bb602c
index 29436dbc1509..2340fb8f5565 100644
bb602c
--- a/src/tests/functions.at
bb602c
+++ b/src/tests/functions.at
bb602c
@@ -146,6 +146,7 @@ m4_define([FWD_END_TEST], [
bb602c
         sed -i "/modprobe: ERROR:/d" ./firewalld.log
bb602c
         sed -i "/WARNING: Failed to load nf_conntrack module/d" ./firewalld.log
bb602c
         sed -i "/WARNING: Failed to get and parse nf_conntrack_helper setting/d" ./firewalld.log
bb602c
+        sed -i "/WARNING: AllowZoneDrifting is enabled./d" ./firewalld.log
bb602c
         if test x"$1" != x"ignore"; then
bb602c
             if test -n "$1"; then
bb602c
                 sed -i $1 ./firewalld.log
bb602c
diff --git a/src/tests/regression/rhbz1514043.at b/src/tests/regression/rhbz1514043.at
bb602c
index ff2ede2ece71..7f061d86c2f1 100644
bb602c
--- a/src/tests/regression/rhbz1514043.at
bb602c
+++ b/src/tests/regression/rhbz1514043.at
bb602c
@@ -1,4 +1,9 @@
bb602c
 FWD_START_TEST([--set-log-denied does not zero config])
bb602c
+
bb602c
+dnl Expected test results assume this is set to "no"
bb602c
+AT_CHECK([sed -i 's/^AllowZoneDrifting.*/AllowZoneDrifting=no/' ./firewalld.conf])
bb602c
+FWD_RELOAD
bb602c
+
bb602c
 FWD_CHECK([-q --set-log-denied=all])
bb602c
 FWD_CHECK([-q --permanent --zone=public --add-service=samba])
bb602c
 FWD_RELOAD
bb602c
-- 
bb602c
2.23.0
bb602c