Blob Blame History Raw
diff -up firewalld-0.3.9/doc/xml/firewalld.dbus.xml.RHBZ#1111573 firewalld-0.3.9/doc/xml/firewalld.dbus.xml
--- firewalld-0.3.9/doc/xml/firewalld.dbus.xml.RHBZ#1111573	2014-09-30 00:17:43.481483444 +0200
+++ firewalld-0.3.9/doc/xml/firewalld.dbus.xml	2014-09-30 00:23:09.185530614 +0200
@@ -1509,7 +1509,7 @@
             </listitem>
           </varlistentry>
           <varlistentry>
-            <term>Lockdown - s - (ro)</term>
+            <term>Lockdown - s - (rw)</term>
             <listitem>
               <para>
 		If this property is enabled, firewall changes with the D-Bus interface will be limited to applications that are listed in the lockdown whitelist.
diff -up firewalld-0.3.9/src/firewall/server/config.py.RHBZ#1111573 firewalld-0.3.9/src/firewall/server/config.py
--- firewalld-0.3.9/src/firewall/server/config.py.RHBZ#1111573	2013-12-03 14:59:48.000000000 +0100
+++ firewalld-0.3.9/src/firewall/server/config.py	2014-09-30 00:22:27.940394904 +0200
@@ -359,7 +359,7 @@ class FirewallDConfig(slip.dbus.service.
                 "org.freedesktop.DBus.Error.UnknownInterface: "
                 "FirewallD does not implement %s" % interface_name)
 
-        if property_name in [ "MinimalMark", "CleanupOnExit" ]:
+        if property_name in [ "MinimalMark", "CleanupOnExit", "Lockdown" ]:
             if property_name == "MinimalMark":
                 try:
                     foo = int(new_value)
@@ -370,7 +370,7 @@ class FirewallDConfig(slip.dbus.service.
             except:
                 raise FirewallError(INVALID_VALUE, "'%s' for %s" % \
                                             (new_value, property_name))
-            if property_name in [ "CleanupOnExit" ]:
+            if property_name in [ "CleanupOnExit", "Lockdown" ]:
                 if new_value.lower() not in [ "yes", "no", "true", "false" ]:
                     raise FirewallError(INVALID_VALUE, "'%s' for %s" % \
                                             (new_value, property_name))
@@ -378,7 +378,7 @@ class FirewallDConfig(slip.dbus.service.
             self.config.get_firewalld_conf().write()
             self.PropertiesChanged(interface_name,
                                    { property_name: new_value }, [ ])
-        elif property_name in [ "DefaultZone", "Lockdown" ]:
+        elif property_name in [ "DefaultZone" ]:
             raise dbus.exceptions.DBusException(
                 "org.freedesktop.DBus.Error.PropertyReadOnly: "
                 "Property '%s' is read-only" % property_name)