Blame SOURCES/firewalld-0.3.9-RHBZ#1111573.patch

06cdf6
diff -up firewalld-0.3.9/doc/xml/firewalld.dbus.xml.RHBZ#1111573 firewalld-0.3.9/doc/xml/firewalld.dbus.xml
06cdf6
--- firewalld-0.3.9/doc/xml/firewalld.dbus.xml.RHBZ#1111573	2014-09-30 00:17:43.481483444 +0200
06cdf6
+++ firewalld-0.3.9/doc/xml/firewalld.dbus.xml	2014-09-30 00:23:09.185530614 +0200
06cdf6
@@ -1509,7 +1509,7 @@
06cdf6
             </listitem>
06cdf6
           </varlistentry>
06cdf6
           <varlistentry>
06cdf6
-            <term>Lockdown - s - (ro)</term>
06cdf6
+            <term>Lockdown - s - (rw)</term>
06cdf6
             <listitem>
06cdf6
               <para>
06cdf6
 		If this property is enabled, firewall changes with the D-Bus interface will be limited to applications that are listed in the lockdown whitelist.
06cdf6
diff -up firewalld-0.3.9/src/firewall/server/config.py.RHBZ#1111573 firewalld-0.3.9/src/firewall/server/config.py
06cdf6
--- firewalld-0.3.9/src/firewall/server/config.py.RHBZ#1111573	2013-12-03 14:59:48.000000000 +0100
06cdf6
+++ firewalld-0.3.9/src/firewall/server/config.py	2014-09-30 00:22:27.940394904 +0200
06cdf6
@@ -359,7 +359,7 @@ class FirewallDConfig(slip.dbus.service.
06cdf6
                 "org.freedesktop.DBus.Error.UnknownInterface: "
06cdf6
                 "FirewallD does not implement %s" % interface_name)
06cdf6
 
06cdf6
-        if property_name in [ "MinimalMark", "CleanupOnExit" ]:
06cdf6
+        if property_name in [ "MinimalMark", "CleanupOnExit", "Lockdown" ]:
06cdf6
             if property_name == "MinimalMark":
06cdf6
                 try:
06cdf6
                     foo = int(new_value)
06cdf6
@@ -370,7 +370,7 @@ class FirewallDConfig(slip.dbus.service.
06cdf6
             except:
06cdf6
                 raise FirewallError(INVALID_VALUE, "'%s' for %s" % \
06cdf6
                                             (new_value, property_name))
06cdf6
-            if property_name in [ "CleanupOnExit" ]:
06cdf6
+            if property_name in [ "CleanupOnExit", "Lockdown" ]:
06cdf6
                 if new_value.lower() not in [ "yes", "no", "true", "false" ]:
06cdf6
                     raise FirewallError(INVALID_VALUE, "'%s' for %s" % \
06cdf6
                                             (new_value, property_name))
06cdf6
@@ -378,7 +378,7 @@ class FirewallDConfig(slip.dbus.service.
06cdf6
             self.config.get_firewalld_conf().write()
06cdf6
             self.PropertiesChanged(interface_name,
06cdf6
                                    { property_name: new_value }, [ ])
06cdf6
-        elif property_name in [ "DefaultZone", "Lockdown" ]:
06cdf6
+        elif property_name in [ "DefaultZone" ]:
06cdf6
             raise dbus.exceptions.DBusException(
06cdf6
                 "org.freedesktop.DBus.Error.PropertyReadOnly: "
06cdf6
                 "Property '%s' is read-only" % property_name)