diff -up firewalld-0.3.9/doc/xml/firewalld.dbus.xml.RHBZ#1111573 firewalld-0.3.9/doc/xml/firewalld.dbus.xml
--- firewalld-0.3.9/doc/xml/firewalld.dbus.xml.RHBZ#1111573 2014-09-30 00:17:43.481483444 +0200
+++ firewalld-0.3.9/doc/xml/firewalld.dbus.xml 2014-09-30 00:23:09.185530614 +0200
@@ -1509,7 +1509,7 @@
</listitem>
</varlistentry>
<varlistentry>
- <term>Lockdown - s - (ro)</term>
+ <term>Lockdown - s - (rw)</term>
<listitem>
<para>
If this property is enabled, firewall changes with the D-Bus interface will be limited to applications that are listed in the lockdown whitelist.
diff -up firewalld-0.3.9/src/firewall/server/config.py.RHBZ#1111573 firewalld-0.3.9/src/firewall/server/config.py
--- firewalld-0.3.9/src/firewall/server/config.py.RHBZ#1111573 2013-12-03 14:59:48.000000000 +0100
+++ firewalld-0.3.9/src/firewall/server/config.py 2014-09-30 00:22:27.940394904 +0200
@@ -359,7 +359,7 @@ class FirewallDConfig(slip.dbus.service.
"org.freedesktop.DBus.Error.UnknownInterface: "
"FirewallD does not implement %s" % interface_name)
- if property_name in [ "MinimalMark", "CleanupOnExit" ]:
+ if property_name in [ "MinimalMark", "CleanupOnExit", "Lockdown" ]:
if property_name == "MinimalMark":
try:
foo = int(new_value)
@@ -370,7 +370,7 @@ class FirewallDConfig(slip.dbus.service.
except:
raise FirewallError(INVALID_VALUE, "'%s' for %s" % \
(new_value, property_name))
- if property_name in [ "CleanupOnExit" ]:
+ if property_name in [ "CleanupOnExit", "Lockdown" ]:
if new_value.lower() not in [ "yes", "no", "true", "false" ]:
raise FirewallError(INVALID_VALUE, "'%s' for %s" % \
(new_value, property_name))
@@ -378,7 +378,7 @@ class FirewallDConfig(slip.dbus.service.
self.config.get_firewalld_conf().write()
self.PropertiesChanged(interface_name,
{ property_name: new_value }, [ ])
- elif property_name in [ "DefaultZone", "Lockdown" ]:
+ elif property_name in [ "DefaultZone" ]:
raise dbus.exceptions.DBusException(
"org.freedesktop.DBus.Error.PropertyReadOnly: "
"Property '%s' is read-only" % property_name)