diff -up firewalld-0.3.9/doc/xml/firewalld.dbus.xml.RHBZ#1111573 firewalld-0.3.9/doc/xml/firewalld.dbus.xml --- firewalld-0.3.9/doc/xml/firewalld.dbus.xml.RHBZ#1111573 2014-09-30 00:17:43.481483444 +0200 +++ firewalld-0.3.9/doc/xml/firewalld.dbus.xml 2014-09-30 00:23:09.185530614 +0200 @@ -1509,7 +1509,7 @@ - Lockdown - s - (ro) + Lockdown - s - (rw) If this property is enabled, firewall changes with the D-Bus interface will be limited to applications that are listed in the lockdown whitelist. diff -up firewalld-0.3.9/src/firewall/server/config.py.RHBZ#1111573 firewalld-0.3.9/src/firewall/server/config.py --- firewalld-0.3.9/src/firewall/server/config.py.RHBZ#1111573 2013-12-03 14:59:48.000000000 +0100 +++ firewalld-0.3.9/src/firewall/server/config.py 2014-09-30 00:22:27.940394904 +0200 @@ -359,7 +359,7 @@ class FirewallDConfig(slip.dbus.service. "org.freedesktop.DBus.Error.UnknownInterface: " "FirewallD does not implement %s" % interface_name) - if property_name in [ "MinimalMark", "CleanupOnExit" ]: + if property_name in [ "MinimalMark", "CleanupOnExit", "Lockdown" ]: if property_name == "MinimalMark": try: foo = int(new_value) @@ -370,7 +370,7 @@ class FirewallDConfig(slip.dbus.service. except: raise FirewallError(INVALID_VALUE, "'%s' for %s" % \ (new_value, property_name)) - if property_name in [ "CleanupOnExit" ]: + if property_name in [ "CleanupOnExit", "Lockdown" ]: if new_value.lower() not in [ "yes", "no", "true", "false" ]: raise FirewallError(INVALID_VALUE, "'%s' for %s" % \ (new_value, property_name)) @@ -378,7 +378,7 @@ class FirewallDConfig(slip.dbus.service. self.config.get_firewalld_conf().write() self.PropertiesChanged(interface_name, { property_name: new_value }, [ ]) - elif property_name in [ "DefaultZone", "Lockdown" ]: + elif property_name in [ "DefaultZone" ]: raise dbus.exceptions.DBusException( "org.freedesktop.DBus.Error.PropertyReadOnly: " "Property '%s' is read-only" % property_name)