diff --git a/.firewalld.metadata b/.firewalld.metadata
new file mode 100644
index 0000000..409d5bd
--- /dev/null
+++ b/.firewalld.metadata
@@ -0,0 +1 @@
+b67642886fefe0549b227d6e5f2455008c129ccc SOURCES/firewalld-0.3.8.tar.bz2
diff --git a/README.md b/README.md
deleted file mode 100644
index 0e7897f..0000000
--- a/README.md
+++ /dev/null
@@ -1,5 +0,0 @@
-The master branch has no content
- 
-Look at the c7 branch if you are working with CentOS-7, or the c4/c5/c6 branch for CentOS-4, 5 or 6
- 
-If you find this file in a distro specific branch, it means that no content has been checked in yet
diff --git a/SPECS/firewalld.spec b/SPECS/firewalld.spec
new file mode 100644
index 0000000..2e8d02c
--- /dev/null
+++ b/SPECS/firewalld.spec
@@ -0,0 +1,768 @@
+Summary: A firewall daemon with D-BUS interface providing a dynamic firewall
+Name: firewalld
+Version: 0.3.8
+Release: 1%{?dist}
+URL: http://fedorahosted.org/firewalld
+License: GPLv2+
+Group: System Environment/Base
+Source0: https://fedorahosted.org/released/firewalld/%{name}-%{version}.tar.bz2
+%if 0%{?fedora} > 17
+Patch0: firewalld-0.2.6-MDNS-default.patch
+%endif
+BuildArch: noarch
+BuildRequires: desktop-file-utils
+BuildRequires: gettext
+BuildRequires: intltool
+# glib2-devel is needed for gsettings.m4
+BuildRequires: glib2, glib2-devel
+BuildRequires: systemd-units
+BuildRequires: docbook-style-xsl
+Requires: dbus-python
+Requires: python-slip-dbus
+Requires: python-decorator
+%if 0%{?fedora} > 17 || 0%{?rhel} > 6
+Requires: pygobject3-base
+%else
+Requires: pygobject3
+%endif
+Requires: iptables, ebtables
+Requires(post): chkconfig
+Requires(preun): chkconfig
+Requires(post): systemd
+Requires(preun): systemd
+Requires(postun): systemd
+
+%description
+firewalld is a firewall service daemon that provides a dynamic customizable 
+firewall with a D-BUS interface.
+
+%package -n firewall-applet
+Summary: Firewall panel applet
+Group: System Environment/Base
+Requires: %{name} = %{version}-%{release}
+Requires: firewall-config = %{version}-%{release}
+Requires: hicolor-icon-theme
+Requires: gtk3
+%if 0%{?fedora} > 17 || 0%{?rhel} > 6
+Requires: pygobject3-base
+%else
+Requires: pygobject3
+%endif
+
+%description -n firewall-applet
+The firewall panel applet provides a status information of firewalld and also 
+the firewall settings.
+
+%package -n firewall-config
+Summary: Firewall configuration application
+Group: System Environment/Base
+Requires: %{name} = %{version}-%{release}
+Requires: hicolor-icon-theme
+Requires: gtk3
+%if 0%{?fedora} > 17 || 0%{?rhel} > 6
+Requires: pygobject3-base
+%else
+Requires: pygobject3
+%endif
+
+%description -n firewall-config
+The firewall configuration application provides an configuration interface for 
+firewalld.
+
+%prep
+%setup -q
+%if 0%{?fedora} > 17
+%patch0 -p1
+%endif
+
+%build
+%configure --enable-sysconfig
+
+%install
+make install DESTDIR=%{buildroot}
+
+desktop-file-install --delete-original \
+  --dir %{buildroot}%{_sysconfdir}/xdg/autostart \
+  %{buildroot}%{_sysconfdir}/xdg/autostart/firewall-applet.desktop
+desktop-file-install --delete-original \
+  --dir %{buildroot}%{_datadir}/applications \
+  %{buildroot}%{_datadir}/applications/firewall-config.desktop
+
+%find_lang %{name} --all-name
+
+%post
+%systemd_post firewalld.service
+
+%preun
+%systemd_preun firewalld.service
+
+%postun
+%systemd_postun_with_restart firewalld.service 
+
+
+%post -n firewall-applet
+/bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null || :
+
+%postun -n firewall-applet
+if [ $1 -eq 0 ] ; then
+    /bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null
+    /usr/bin/gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || :
+    /usr/bin/glib-compile-schemas %{_datadir}/glib-2.0/schemas &> /dev/null || :
+fi
+
+%posttrans -n firewall-applet
+/usr/bin/gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || :
+/usr/bin/glib-compile-schemas %{_datadir}/glib-2.0/schemas &> /dev/null || :
+
+
+%post -n firewall-config
+/bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null || :
+
+%postun -n firewall-config
+if [ $1 -eq 0 ] ; then
+    /bin/touch --no-create %{_datadir}/icons/hicolor &>/dev/null
+    /usr/bin/gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || :
+    /usr/bin/glib-compile-schemas %{_datadir}/glib-2.0/schemas &> /dev/null || :
+fi
+
+%posttrans -n firewall-config
+/usr/bin/gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || :
+/usr/bin/glib-compile-schemas %{_datadir}/glib-2.0/schemas &> /dev/null || :
+
+%files -f %{name}.lang
+%doc COPYING README
+%{_sbindir}/firewalld
+%{_bindir}/firewall-cmd
+%{_bindir}/firewall-offline-cmd
+%dir %{_datadir}/bash-completion/completions
+%{_datadir}/bash-completion/completions/firewall-cmd
+%defattr(0640,root,root)
+%attr(0750,root,root) %dir %{_prefix}/lib/firewalld
+%attr(0750,root,root) %dir %{_prefix}/lib/firewalld/icmptypes
+%attr(0750,root,root) %dir %{_prefix}/lib/firewalld/services
+%attr(0750,root,root) %dir %{_prefix}/lib/firewalld/zones
+%{_prefix}/lib/firewalld/icmptypes/*.xml
+%{_prefix}/lib/firewalld/services/*.xml
+%{_prefix}/lib/firewalld/zones/*.xml
+%attr(0750,root,root) %dir %{_sysconfdir}/firewalld
+%config(noreplace) %{_sysconfdir}/firewalld/firewalld.conf
+%config(noreplace) %{_sysconfdir}/firewalld/lockdown-whitelist.xml
+%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/icmptypes
+%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/services
+%attr(0750,root,root) %dir %{_sysconfdir}/firewalld/zones
+%defattr(0644,root,root)
+%config(noreplace) %{_sysconfdir}/sysconfig/firewalld
+#%attr(0755,root,root) %{_initrddir}/firewalld
+%{_unitdir}/firewalld.service
+%config(noreplace) %{_sysconfdir}/dbus-1/system.d/FirewallD.conf
+%{_datadir}/polkit-1/actions/org.fedoraproject.FirewallD1.policy
+%attr(0755,root,root) %dir %{python_sitelib}/firewall
+%attr(0755,root,root) %dir %{python_sitelib}/firewall/config
+%attr(0755,root,root) %dir %{python_sitelib}/firewall/core
+%attr(0755,root,root) %dir %{python_sitelib}/firewall/core/io
+%attr(0755,root,root) %dir %{python_sitelib}/firewall/server
+%{python_sitelib}/firewall/*.py*
+%{python_sitelib}/firewall/config/*.py*
+%{python_sitelib}/firewall/core/*.py*
+%{python_sitelib}/firewall/core/io/*.py*
+%{python_sitelib}/firewall/server/*.py*
+%{_mandir}/man1/firewall*cmd*.1*
+%{_mandir}/man1/firewalld*.1*
+%{_mandir}/man5/firewall*.5*
+
+%files -n firewall-applet
+%{_bindir}/firewall-applet
+%defattr(0644,root,root)
+%{_sysconfdir}/xdg/autostart/firewall-applet.desktop
+%{_datadir}/icons/hicolor/*/apps/firewall-applet*.*
+%{_datadir}/glib-2.0/schemas/org.fedoraproject.FirewallApplet.gschema.xml
+%{_mandir}/man1/firewall-applet*.1*
+
+%files -n firewall-config
+%{_bindir}/firewall-config
+%defattr(0644,root,root)
+%{_datadir}/firewalld/firewall-config.glade
+%{_datadir}/firewalld/gtk3_chooserbutton.py*
+%{_datadir}/applications/firewall-config.desktop
+%{_datadir}/icons/hicolor/*/apps/firewall-config*.*
+%{_datadir}/glib-2.0/schemas/org.fedoraproject.FirewallConfig.gschema.xml
+%{_mandir}/man1/firewall-config*.1*
+
+%changelog
+* Tue Nov 05 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.8-1
+- fix memory leaks
+- New option --debug-gc
+- Python3 compatibility
+- Better non-ascii support
+- several firewall-config & firewall-applet fixes
+- New --remove-rules commands for firewall-cmd and removeRules methods for D-Bus
+- Fixed FirewallDirect.get_rules to return proper list
+- Fixed LastUpdatedOrderedDict.keys()
+- Enable rich rule usage in trusted zone (RHBZ#994144)
+- New error codes: INVALID_CONTEXT, INVALID_COMMAND, INVALID_USER and INVALID_UID
+
+* Thu Oct 17 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.7-1
+- Don't fail on missing ip[6]tables/ebtables table. (RHBZ#967376)
+- bash-completion: --permanent --direct options
+- firewall/core/fw.py: fix checking for iptables & ip6tables (RHBZ#1017087)
+- firewall-cmd: use client's exception_handler instead of catching exceptions ourselves
+- FirewallClientZoneSettings: fix {add|remove|query}RichRule()
+- Extend amanda-client service with 10080/tcp (RHBZ#1016867)
+- Simplify Rich_Rule()_lexer() by using functions.splitArgs()
+- Fix encoding problems in exception handling (RHBZ#1015941)
+
+* Fri Oct 04 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.6.2-1
+- firewall-offline-cmd: --forward-port 'toaddr' is optional (RHBZ#1014958)
+- firewall-cmd: fix variable name (RHBZ#1015011)
+
+* Thu Oct 03 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.6.1-1
+- remove superfluous po files from archive
+
+* Wed Oct 02 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.6-1
+- firewalld.richlanguage.xml: correct log levels (RHBZ#993740)
+- firewall-config: Make sure that all zone settings are updated properly on firewalld restart
+- Rich_Limit: Allow long representation for duration (RHBZ#994103
+- firewall-config: Show "Changes applied." after changes (RHBZ#993643)
+- Use own connection dialog to change zones for NM connections
+- Rename service cluster-suite to high-availability (RHBZ#885257)
+- Permanent direct support for firewall-config and firewall-cmd
+- Try to avoid file descriptor leaking (RHBZ#951900)
+- New functions to split and join args properly (honoring quotes)
+- firewall-cmd(1): 2 simple examples
+- Better IPv6 NAT checking.
+- Ship firewalld.direct(5).
+
+* Mon Sep 30 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.5-1
+- Only use one PK action for configuration (RHBZ#994729)
+- firewall-cmd: indicate non-zero exit code with red color
+- rich-rule: enable to have log without prefix & log_level & limit
+- log-level warn/err -> warning/error (RHBZ#1009436)
+- Use policy DROP while reloading, do not reset policy in restart twice
+- Add _direct chains to all table and chain combinations
+- documentation improvements
+- New firewalld.direct(5) man page docbook source
+- tests/firewall-cmd_test.sh: make rich language tests work
+- Rich_Rule._import_from_string(): improve error messages (RHBZ#994150)
+- direct.passthrough wasn't always matching out_signature (RHBZ#967800)
+- firewall-config: twist ICMP Type IP address family logic.
+- firewall-config: port-forwarding/masquerading dialog (RHBZ#993658)
+- firewall-offline-cmd: New --remove-service=<service> option (BZ#969106)
+- firewall-config: Options->Lockdown was not changing permanent.
+- firewall-config: edit line on doubleclick (RHBZ#993572)
+- firewall-config: System Default Zone -> Default Zone (RHBZ#993811)
+- New direct D-Bus interface, persistent direct rule handling, enabled passthough
+- src/firewall-cmd: Fixed help output to use more visual parameters
+- src/firewall-cmd: New usage output, no redirection to man page anymore
+- src/firewall/core/rich.py: Fixed forwad port destinations
+- src/firewall-offline-cmd: Early enable/disable handling now with mask/unmask
+- doc/xml/firewalld.zone.xml: Added more information about masquerade use
+- Prefix to log message is optional (RHBZ#998079)
+- firewall-cmd: fix --permanent --change-interface (RHBZ#997974)
+- Sort zones/interfaces/service/icmptypes on output.
+- wbem-https service (RHBZ#996668)
+- applet&config: add support for KDE NetworkManager connection editor
+- firewall/core/fw_config.py: New method update_lockdown_whitelist
+- Added missing file watcher for lockdown whitelist in config D-Bus interface
+- firewall/core/watcher: New add_watch_file for lockdown-whitelist and direct
+- Make use of IPv6 NAT conditional, based on kernel number (RHBZ#967376)
+
+* Tue Jul 30 2013 Thomas Woerner <twoerner@redhat.com> 0.3.4-1
+- several rich rule check enhancements and fixes
+- firewall-cmd: direct options - check ipv4|ipv6|eb (RHBZ#970505)
+- firewall-cmd(1): improve description of direct options (RHBZ#970509)
+- several firewall-applet enhancements and fixes
+- New README
+- several doc and man page fixes
+- Service definitions for PCP daemons (RHBZ#972262)
+- bash-completion: add lockdown and rich language options
+- firewall-cmd: add --permanent --list-all[-zones]
+- firewall-cmd: new -q/--quiet option
+- firewall-cmd: warn when default zone not active (RHBZ#971843)
+- firewall-cmd: check priority in --add-rule (RHBZ#914955)
+- add dhcpv6 (for server) service (RHBZ#917866)
+- firewall-cmd: add --permanent --get-zone-of-interface/source --change-interface/source
+- firewall-cmd: print result (yes/no) of all --query-* commands
+- move permanent-getZoneOf{Interface|Source} from firewall-cmd to server
+- Check Interfaces/sources when updating permanent zone settings.
+- FirewallDConfig: getZoneOfInterface/Source can actually return more zones
+- Fixed toaddr check in forward port to only allow single address, no range
+- firewall-cmd: various output improvements
+- fw_zone: use check_single_address from firewall.functions
+- getZoneOfInterface/Source does not need to throw exception
+- firewall.functions: Use socket.inet_pton in checkIP, fixed checkIP*nMask
+- firewall.core.io.service: Properly check port/proto and destination address
+- Install applet desktop file into /etc/xdg/autostart
+- Fixed option problem with rich rule destinations (RHBZ#979804)
+- Better exception creation in dbus_handle_exceptions() decorator (RHBZ#979790)
+- Updated firewall-offline-cmd
+- Use priority in add, remove, query and list of direct rules (RHBZ#979509)
+- New documentation (man pages are created from docbook sources)
+- firewall/core/io/direct.py: use prirority for rule methods, new get_all_ methods
+- direct: pass priority also to client.py and firewall-cmd
+- applet: New blink and blink-count settings
+- firewall.functions: New function ppid_of_pid
+- applet: Check for gnome3 and fix it, use new settings, new size-changed cb
+- firewall-offline-cmd: Fix use of systemctl in chroot
+- firewall-config: use string.ascii_letters instead of string.letters
+- dbus_to_python(): handle non-ascii chars in dbus.String.
+- Modernize old syntax constructions.
+- dict.keys() in Python 3 returns a "view" instead of list
+- Use gettext.install() to install _() in builtins namespace.
+- Allow non-ascii chars in 'short' and 'description'
+- README: More information for "Working With The Source Repository"
+- Build environment fixes
+- firewalld.spec: Added missing checks for rhel > 6 for pygobject3-base
+- firewall-applet: New setting show-inactive
+- Don't stop on reload when lockdown already enabled (RHBZ#987403)
+- firewall-cmd: --lockdown-on/off did not touch firewalld.conf
+- FirewallApplet.gschema.xml: Dropped unused sender-info setting
+- doc/firewall-applet.xml: Added information about gsettings
+- several debug and log message fixes
+- Add chain for sources so they can be checked before interfaces (RHBZ#903222)
+- Add dhcp and proxy-dhcp services (RHBZ#986947)
+- io/Zone(): don't error on deprecated family attr of source elem
+- Limit length of zone file name (to 12 chars) due to Netfilter internals.
+- It was not possible to overload a zone with defined source(s).
+- DEFAULT_ZONE_TARGET: {chain}_ZONE_{zone} -> {chain}_{zone}
+- New runtime get<X>Settings for services and icmptypes, fixed policies callbacks
+- functions: New functions checkUser, checkUid and checkCommand
+- src/firewall/client: Fixed lockdown-whitelist-updated signal handling
+- firewall-cmd(1): move firewalld.richlanguage(5) reference in --*-rich-rule
+- Rich rule service: Only add modules for accept action
+- firewall/core/rich: Several fixes and enhanced checks
+- Fixed reload of direct rules
+- firewall/client: New functions to set and get the exception handler
+- firewall-config: New and enhanced UI to handle lockdown and rich rules
+- zone's immutable attribute is redundant
+- Do not allow to set settings in config for immutable zones.
+- Ignore deprecated 'immutable' attribute in zone files.
+- Eviscerate 'immutable' completely.
+- FirewallDirect.query_rule(): fix it
+- permanent direct: activate firewall.core.io.direct:Direct reader
+- core/io/*: simplify getting of character data
+- FirewallDirect.set_config(): allow reloading
+
+* Thu Jun 20 2013  Jiri Popelka <jpopelka@redhat.com>
+- Remove migrating to a systemd unit file from a SysV initscript
+- Remove pointless "ExclusiveOS" tag
+
+* Fri Jun  7 2013 Thomas Woerner <twoerner@redhat.com> 0.3.3-2
+- Fixed rich rule check for use in D-Bus
+
+* Thu Jun  6 2013 Thomas Woerner <twoerner@redhat.com> 0.3.3-1
+- new service files
+- relicensed logger.py under GPLv2+
+- firewall-config: sometimes we don't want to use client's exception handler
+- When removing Service/IcmpType remove it from zones too (RHBZ#958401)
+- firewall-config: work-around masquerade_check_cb() being called more times
+- Zone(IO): add interfaces/sources to D-Bus signature
+- Added missing UNKNOWN_SOURCE error code
+- fw_zone.check_source: Raise INVALID_FAMILY if family is invalid
+- New changeZoneOfInterface method, marked changeZone as deprecated
+- Fixed firewall-cmd man page entry for --panic-on
+- firewall-applet: Fixed possible problems of unescaped strings used for markup
+- New support to bind zones to source addresses and ranges (D-BUS, cmd, applet
+- Cleanup of unused variables in FirewallD.start
+- New firewall/fw_types.py with LastUpdatedOrderedDict
+- direct.chains, direct.rules: Using LastUpdatedOrderedDict
+- Support splitted zone files
+- New reader and writer for stored direct chains and rules
+- LockdownWhitelist: fix write(), add get_commands/uids/users/contexts()
+- fix service_writer() and icmptype_writer() to put newline at end of file
+- firewall-cmd: fix --list-sources
+- No need to specify whether source address family is IPv4 or IPv6
+- add getZoneOfSource() to D-Bus interface
+- Add tests and bash-completion for the new "source" operations
+- Convert all input args in D-Bus methods
+- setDefaultZone() was calling accessCheck() *after* the action
+- New uniqify() function to remove duplicates from list whilst preserving order
+- Zone.combine() merge also services and ports
+- config/applet: silence DBusException during start when FirewallD is not running (RHBZ#966518)
+- firewall-applet: more fixes to make the address sources family agnostic
+- Better defaults for lockdown white list
+- Use auth_admin_keep for allow_any and allow_inactive also
+- New D-Bus API for lockdown policies
+- Use IPv4, IPv6 and BRIDGE for FirewallD properties
+- Use rich rule action as audit type
+- Prototype of string-only D-Bus interface for rich language
+- Fixed wrongly merged source family check in firewall/core/io/zone.py
+- handle_cmr: report errors, cleanup modules in error case only, mark handling
+- Use audit type from rule action, fixed rule output
+- Fixed lockdown whitelist D-Bus handling method names
+- New rich rule handling in runtime D-Bus interface
+- Added interface, source and rich rule handling (runtime and permanent)
+- Fixed dbus_obj in FirewallClientConfigPolicies, added queryLockdown
+- Write changes in setLockdownWhitelist
+- Fixed typo in policies log message in method calls
+- firewall-cmd: Added rich rule, lockdown and lockdown whitelist handling
+- Don't check access in query/getLockdownWhitelist*()
+- firewall-cmd: Also output masquerade flag in --list-all
+- firewall-cmd: argparse is able to convert argument to desired type itself
+- firewall-cmd_test.sh: tests for permanent interfaces/sources and lockdown whitelist
+- Makefile.am: add missing files
+- firewall-cmd_test.sh: tests for rich rules
+- Added lockdown, source, interface and rich rule docs to firewall-cmd
+- Do not masquerade lo if masquerade is enabled in the default zone (RHBZ#904098)
+- Use <rule> in metavar for firewall-cmd parser
+
+* Fri May 10 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.2-2
+- removed unintentional en_US.po from tarball
+
+* Tue Apr 30 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.2-1
+- Fix signal handling for SIGTERM
+- Additional service files (RHBZ#914859)
+- Updated po files
+- s/persistent/permanent/ (Trac Ticket #7)
+- Better behaviour when running without valid DISPLAY (RHBZ#955414)
+- client.handle_exceptions(): do not loop forever
+- Set Zone.defaults in zone_reader (RHBZ#951747)
+- client: do not pass the dbus exception name to handler
+- IO_Object_XMLGenerator: make it work with Python 2.7.4 (RHBZ#951741)
+- firewall-cmd: do not use deprecated BaseException.message
+- client.py: fix handle_exceptions() (RHBZ#951314)
+- firewall-config: check zone/service/icmptype name (RHBZ#947820)
+- Allow 3121/tcp (pacemaker_remote) in cluster-suite service. (RHBZ#885257)
+- firewall-applet: fix default zone hangling in 'shields-up' (RHBZ#947230)
+- FirewallError.get_code(): check for unknown error
+
+* Wed Apr 17 2013 Jiri Popelka <jpopelka@redhat.com> - 0.3.1-2
+- Make permanenent changes work with Python 2.7.4 (RHBZ#951741)
+
+* Thu Mar 28 2013 Thomas Woerner <twoerner@redhat.com> 0.3.1-1
+- Use explicit file lists for make dist
+- New rich rule validation check code
+- New global check_port and check_address functions
+- Allow source white and black listing with the rich rule
+- Fix error handling in case of unsupported family in rich rule
+- Enable ip_forwarding in masquerade and forward-port
+- New functions to read and write simple files using filename and content
+- Add --enable-sysconfig to install Fedora-specific sysconfig config file.
+- Add chains for security table (RHBZ#927015)
+- firewalld.spec: no need to specify --with-systemd-unitdir
+- firewalld.service: remove syslog.target and dbus.target
+- firewalld.service: replace hard-coded paths
+- Move bash-completion to new location.
+- Revert "Added configure for new build env"
+- Revert "Added Makefile.in files"
+- Revert "Added po/Makefile.in.in"
+- Revert "Added po/LINGUAS"
+- Revert "Added aclocal.m4"
+- Amend zone XML Schema
+
+* Wed Mar 20 2013 Thomas Woerner <twoerner@redhat.com> 0.3.0-1
+- Added rich language support
+- Added lockdown feature
+- Allow to bind interfaces and sources to zones permanently
+- Enabled IPv6 NAT support
+  masquerading and port/packet forwarding for IPv6 only with rich language
+- Handle polkit errors in client class and firewall-config
+- Added priority description for --direct --add-rule in firewall-cmd man page
+- Add XML Schemas for zones/services/icmptypes XMLs
+- Don't keep file descriptors open when forking
+- Introduce --nopid option for firewalld
+- New FORWARD_IN_ZONES and FORWARD_OUT_ZONES chains (RHBZ#912782)
+- Update cluster-suite service (RHBZ#885257)
+- firewall-cmd: rename --enable/disable-panic to --panic-on/off (RHBZ#874912)
+- Fix interaction problem of changed event of gtk combobox with polkit-kde
+  by processing all remaining events (RHBZ#915892)
+- Stop default zone rules being applied to all zones (RHBZ#912782)
+- Firewall.start(): don't call set_default_zone()
+- Add wiki's URL to firewalld(1) and firewall-cmd(1) man pages
+- firewalld-cmd: make --state verbose (RHBZ#886484)
+- improve firewalld --help (RHBZ#910492)
+- firewall-cmd: --add/remove-* can be used multiple times (RHBZ#879834)
+- Continue loading zone in case of wrong service/port etc. (RHBZ#909466)
+- Check also services and icmptypes in Zone() (RHBZ#909466)
+- Increase the maximum length of the port forwarding fields from 5 to 11 in
+  firewall-config
+- firewall-cmd: add usage to fail message
+- firewall-cmd: redefine usage to point to man page
+- firewall-cmd: fix visible problems with arg. parsing
+- Use argparse module for parsing command line options and arguments
+- firewall-cmd.1: better clarify where to find ACTIONs
+- firewall-cmd Bash completion
+- firewall-cmd.1: comment --zone=<zone> usage and move some options
+- Use zone's target only in %s_ZONES chains
+- default zone in firewalld.conf was set to public with every restart (#902845)
+- man page cleanup
+- code cleanup
+
+* Thu Mar 07 2013 Jiri Popelka <jpopelka@redhat.com> - 0.2.12-5
+- Another fix for RHBZ#912782
+
+* Wed Feb 20 2013 Jiri Popelka <jpopelka@redhat.com> - 0.2.12-4
+- Stop default zone rules being applied to all zones (RHBZ#912782)
+
+* Wed Feb 13 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.2.12-3
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
+
+* Tue Jan 22 2013 Jiri Popelka <jpopelka@redhat.com> - 0.2.12-2
+- Default zone in firewalld.conf was reseted with every restart (RHBZ#902845)
+- Add icon cache related scriptlets for firewall-config (RHBZ#902680)
+- Fix typo in firewall-config (RHBZ#895812)
+- Fix few mistakes in firewall-cmd(1) man page
+
+* Mon Jan 14 2013 Thomas Woerner <twoerner@redhat.com> 0.2.12-1
+- firewall-cmd: use -V instead of -v for version info (RHBZ#886477)
+- firewall-cmd: don't check reload()'s return value (RHBZ#886461)
+- actually install firewalld.zones.5
+- firewall-config: treat exceptions when adding new zone/service/icmp
+  (RHBZ#886602)
+- firewalld.spec: Fixed requirements of firewall-config to use gtk2 and
+  pygobject3
+- Fail gracefully when running in non X environment.(RHBZ#886551)
+- offline-cmd: fail gracefully when no s-c-f config
+- fix duplicated iptables rules (RHBZ#886515)
+- detect errors and duplicates in config file (RHBZ#886581)
+- firewall-config: don't make 'Edit Service' and 'Edit ICMP Type' insensitive
+- firewalld.spec: fixed requirements, require pygobject3-base
+- frewall-applet: Unused code cleanup
+- firewall-applet: several usability fixes and enhancements
+  (RHBZ#886531) (RHBZ#886534)
+- firewall/server/server.py: fixed KeyboardInterrupt message (RHBZ#886558)
+- Moved fallback zone and minimal_mark to firewall.config.__init__
+- Do not raise ZONE_ALREADY_SET in change_zone if old zone is set again
+  (RHBZ#886432)
+- Make default zone default for all unset connections/interfaces
+  (RHBZ#888288) (RHBZ#882736)
+- firewall-config: Use Gtk.MessageType.WARNING for warning dialog
+- firewall-config: Handle unknown services and icmptypes in persistent mode
+- firewall-config: Do not load settings more than once
+- firewall-config: UI cleanup and fixes (RHBZ#888242)
+- firewall-cmd: created alias --change-zone for --change-interface
+- firewall-cmd man page updates (RHBZ#806511)
+- Merged branch 'build-cleanups'
+- dropped call to autogen.sh in build stage, not needed anymore due to 
+  'build-cleanups' merge
+
+* Thu Dec 13 2012 Thomas Woerner <twoerner@redhat.com> 0.2.11-2
+- require pygobject3-base instead of pygobject3 (no cairo needed) (RHBZ#874378)
+- fixed dependencies of firewall-config to use gtk3 with pygobject3-base and 
+  not pygtk2
+
+* Tue Dec 11 2012 Thomas Woerner <twoerner@redhat.com> 0.2.11-1
+- Fixed more _xmlplus (PyXML) incompatibilities to python xml
+- Several man page updates
+- Fixed error in addForwardPort, removeForwardPort and queryForwardPort
+- firewall-cmd: use already existing queryForwardPort()
+- Update firewall.cmd man page, use man page as firewall-cmd usage (rhbz#876394)
+- firewall-config: Do not force to show labels in the main toolbar
+- firewall-config: Dropped "Change default zone" from toolbar
+- firewall-config: Added menu entry to change zones of connections
+- firewall-applet: Zones can be changed now using nm-connection-editor
+  (rhbz#876661)
+- translation updates: cs, hu, ja
+
+* Tue Nov 20 2012 Thomas Woerner <twoerner@redhat.com> 0.2.10-1
+- tests/firewalld_config.py: tests for config.service and config.icmptype
+- FirewallClientConfigServiceSettings(): destinations are dict not list
+- service/zone/icmptype: do not write deprecated name attribute
+- New service ntp
+- firewall-config: Fixed name of about dialog
+- configure.in: Fixed getting of error codes
+- Added coding to all pyhton files
+- Fixed copyright years
+- Beautified file headers
+- Force use of pygobject3 in python-slip (RHBZ#874378)
+- Log: firewall.server.config_icmptype, firewall.server.config_service and
+  firewall.server.config_zone: Prepend full path
+- Allow ":" in interface names for interface aliases
+- Add name argument to Updated and Renamed signal
+- Disable IPv4, IPv6 and EB tables if missing - for IPv4/IPv6 only environments
+- firewall-config.glade file cleanup
+- firewall-config: loadDefaults() can throw exception
+- Use toolbars for Add/Edit/Remove/LoadDefaults buttons for zones, services
+  and icmp types
+- New vnc-server service, opens ports for displays :0 to :3 (RHBZ#877035)
+- firewall-cmd: Fix typo in help output, allow default zone usage for
+  permanenent options
+- Translation updates: cs, fr, ja, pt_BR and zh_CN
+
+* Wed Oct 17 2012 Thomas Woerner <twoerner@redhat.com> 0.2.9-1
+- firewall-config: some UI usability changes
+- firewall-cmd: New option --list-all-zones, output of --list-all changed,
+  more option combination checks
+- firewall-applet: Replaced NMClient by direct DBUS calls to fix python core
+  dumps in case of connection activates/deactivates
+- Use fallback 'C' locale if current locale isn't supported (RHBZ#860278)
+- Add interfaces to zones again after reload
+- firewall-cmd: use FirewallClient().connected value
+- firewall-cmd: --remove-interface was not working due to a typo
+- Do not use restorecon for new and backup files
+- Fixed use of properties REJECT and DROP
+- firewalld_test.py: check interfaces after reload
+- Translation updates
+- Renamed firewall-convert-scfw-config to firewall-offline-cmd, used by
+  anaconda for firewall configuration (e.g. kickstart)
+- Fix python shebang to use -Es at installation time for bin_SCRIPTS and
+  sbin_SCRIPTS and at all times in gtk3_chooserbutton.py
+- tests/firewalld_config.py: update test_zones() test case
+- Config interface: improve renaming of zones/services/icmp_types
+- Move emiting of Added signals closer to source.
+- FirewallClient(): config:ServiceAdded signal was wrongly mapped
+- Add argument 'name' to Removed signal
+- firewall-config: Add callbacks for config:[service|icmp]-[added|removed]
+- firewall-config: catch INVALID_X error when removing zone/service/icmp_type
+- firewall-config: remove unused code
+- Revert "Neutralize _xmlplus instead of conforming it"
+- firewall-applet: some UI usability changes
+- firewall-cmd: ALREADY_ENABLED, NOT_ENABLED, ZONE_ALREADY_SET are warnings
+
+* Fri Sep  7 2012 Thomas Woerner <twoerner@redhat.com> 0.2.8-1
+- Do not apply old settings to zones after reload
+- FirewallClient: Added callback structure for firewalld signals
+- New firewall-config with full zone, service and icmptype support
+- Added Shields Up/Down configuration dialog to firewall-applet
+- Name attribute of main tag deprecated for zones, services and icmptypes,
+  will be ignored if present
+- Fixed wrong references in firewalld man page
+- Unregister DBus interfaces after sending out the Removed signal
+- Use proper DBus signature in addIcmpType, addService and addZone
+- New builtin property for config interfaces
+- New test case for Config interface
+- spec: use new systemd-rpm macros (rhbz#850110)
+- More config file verifications
+- Lots of smaller fixes and enhancements
+
+* Tue Aug 21 2012 Jiri Popelka <jpopelka@redhat.com> 0.2.7-2
+- use new systemd-rpm macros (rhbz#850110)
+
+* Mon Aug 13 2012 Thomas Woerner <twoerner@redhat.com> 0.2.7-1
+- Update of firewall-config
+- Some bug fixes
+
+* Tue Aug  7 2012 Thomas Woerner <twoerner@redhat.com> 0.2.6-1
+- New D-BUS interface for persistent configuration
+- Aded support for persistent zone configuration in firewall-cmd
+- New Shields Up feature in firewall-applet
+- New requirements for python-decorator and pygobject3
+- New firewall-config sub-package
+- New firewall-convert-scfw-config config script
+
+* Fri Apr 20 2012 Thomas Woerner <twoerner@redhat.com> 0.2.5-1
+- Fixed traceback in firewall-cmd for failed or canceled authorization, 
+  return proper error codes, new error codes NOT_RUNNING and NOT_AUTHORIZED
+- Enhanced firewalld service file (RHBZ#806868) and (RHBZ#811240)
+- Fixed duplicates in zone after reload, enabled timed settings after reload
+- Removed conntrack --ctstate INVALID check from default ruleset, because it
+  results in ICMP problems (RHBZ#806017).
+- Update interfaces in default zone after reload (rhbz#804814)
+- New man pages for firewalld(1), firewalld.conf(5), firewalld.icmptype(5),
+  firewalld.service(5) and firewalld.zone(5), updated firewall-cmd man page
+  (RHBZ#811257)
+- Fixed firewall-cmd help output
+- Fixed missing icon for firewall-applet (RHBZ#808759)
+- Added root user check for firewalld (RHBZ#767654)
+- Fixed requirements of firewall-applet sub package (RHBZ#808746)
+- Update interfaces in default zone after changing of default zone (RHBZ#804814)
+- Start firewalld before NetworkManager (RHBZ#811240)
+- Add Type=dbus and BusName to service file (RHBZ#811240)
+
+* Fri Mar 16 2012 Thomas Woerner <twoerner@redhat.com> 0.2.4-1
+- fixed firewalld.conf save exception if no temporary file can be written to 
+  /etc/firewalld/
+
+* Thu Mar 15 2012 Thomas Woerner <twoerner@redhat.com> 0.2.3-1
+- firewall-cmd: several changes and fixes
+- code cleanup
+- fixed icmp protocol used for ipv6 (rhbz#801182)
+- added and fixed some comments
+- properly restore zone settings, timeout is always set, check for 0
+- some FirewallError exceptions were actually not raised
+- do not REJECT in each zone
+- removeInterface() don't require zone
+- new tests in firewall-test script
+- dbus_to_python() was ignoring certain values
+- added functions for the direct interface: chains, rules, passthrough
+- fixed inconsistent data after reload
+- some fixes for the direct interface: priority positions are bound to ipv,
+  table and chain
+- added support for direct interface in firewall-cmd:
+- added isImmutable(zone) to zone D-Bus interface
+- renamed policy file
+- enhancements for error messages, enables output for direct.passthrough
+- added allow_any to firewald policies, using at leas auth_admin for policies
+- replaced ENABLE_FAILED, DISABLE_FAILED, ADD_FAILED and REMOVE_FAILED by
+  COMMAND_FAILED, resorted error codes
+- new firewalld configuration setting CleanupOnExit
+- enabled polkit again, found a fix for property problem with slip.dbus.service
+- added dhcpv6-client to 'public' (the default) and to 'internal' zones.
+- fixed missing settings form zone config files in
+  "firewall-cmd --list=all --zone=<zone>" call
+- added list functions for services and icmptypes, added --list=services and
+  --list=icmptypes to firewall-cmd
+
+* Tue Mar  6 2012 Thomas Woerner <twoerner@redhat.com> 0.2.2-1
+- enabled dhcpv6-client service for zones home and work
+- new dhcpv6-client service
+- firewall-cmd: query mode returns reversed values
+- new zone.changeZone(zone, interface)
+- moved zones, services and icmptypes to /usr/lib/firewalld, can be overloaded
+  by files in /etc/firewalld (no overload of immutable zones block, drop,
+  trusted)
+- reset MinimalMark in firewalld.cnf to default value
+- fixed service destination (addresses not used)
+- fix xmlplus to be compatible with the python xml sax parser and python 3
+  by adding __contains__ to xml.sax.xmlreader.AttributesImpl
+- use icon and glib related post, postun and posttrans scriptes for firewall
+- firewall-cmd: fix typo in state
+- firewall-cmd: fix usage()
+- firewall-cmd: fix interface action description in usage()
+- client.py: fix definition of queryInterface()
+- client.py: fix typo in getInterfaces()
+- firewalld.service: do not fork
+- firewall-cmd: fix bug in --list=port and --port action help message
+- firewall-cmd: fix bug in --list=service
+
+* Mon Mar  5 2012 Thomas Woerner <twoerner@redhat.com>
+- moved zones, services and icmptypes to /usr/lib/firewalld, can be overloaded
+  by files in /etc/firewalld (no overload of immutable zones block, drop,
+  trusted)
+
+* Tue Feb 21 2012 Thomas Woerner <twoerner@redhat.com> 0.2.1-1
+- added missing firewall.dbus_utils
+
+* Tue Feb  7 2012 Thomas Woerner <twoerner@redhat.com> 0.2.0-2
+- added glib2-devel to build requires, needed for gsettings.m4
+- added --with-system-unitdir arg to fix installaiton of system file
+- added glib-compile-schemas calls for postun and posttrans
+- added EXTRA_DIST file lists
+
+* Mon Feb  6 2012 Thomas Woerner <twoerner@redhat.com> 0.2.0-1
+- version 0.2.0 with new FirewallD1 D-BUS interface
+- supports zones with a default zone
+- new direct interface as a replacement of the partial virt interface with 
+  additional passthrough functionality
+- dropped custom rules, use direct interface instead
+- dropped trusted interface funcionality, use trusted zone instead
+- using zone, service and icmptype configuration files
+- not using any system-config-firewall parts anymore
+
+* Mon Feb 14 2011 Thomas Woerner <twoerner@redhat.com> 0.1.3-1
+- new version 0.1.3
+- restore all firewall features for reload: panic and virt rules and chains
+- string fixes for firewall-cmd man page (by Jiri Popelka)
+- fixed firewall-cmd port list (by Jiri Popelka)
+- added firewall dbus client connect check to firewall-cmd (by Jiri Popelka)
+- translation updates: de, es, gu, it, ja, kn, ml, nl, or, pa, pl, ru, ta,
+                       uk, zh_CN
+
+* Mon Jan  3 2011 Thomas Woerner <twoerner@redhat.com> 0.1.2-1
+- fixed package according to package review (rhbz#665395):
+  - non executable scripts: dropped shebang
+  - using newer GPL license file
+  - made /etc/dbus-1/system.d/FirewallD.conf config(noreplace)
+  - added requires(post) and (pre) for chkconfig
+
+* Mon Jan  3 2011 Thomas Woerner <twoerner@redhat.com> 0.1.1-1
+- new version 0.1.1
+- fixed source path in POTFILES*
+- added missing firewall_config.py.in
+- added misssing space for spec_ver line
+- using firewall_config.VARLOGFILE
+- added date to logging output
+- also log fatal and error logs to stderr and firewall_config.VARLOGFILE
+- make log message for active_firewalld fatal
+
+* Mon Dec 20 2010 Thomas Woerner <twoerner@redhat.com> 0.1-1
+- initial package (proof of concept implementation)