commit e361f33c2bf42acb2e4db578169326b11041b796
Author: Jay Cornwall <jay@jcornwall.me>
Date: Fri May 9 07:44:52 2014 -0500
firewalld: Apply all rich rules for non-default targets
If a zone had a non-default target then rich PORT and PROTOCOL
rules would not be applied.
Signed-off-by: Jiri Popelka <jpopelka@redhat.com>
diff --git a/src/firewall/core/fw_zone.py b/src/firewall/core/fw_zone.py
index 1e99fef..7f20b48 100644
--- a/src/firewall/core/fw_zone.py
+++ b/src/firewall/core/fw_zone.py
@@ -820,8 +820,8 @@ class FirewallZone:
table = "filter"
chains.append([ table, "INPUT" ])
- target = self._zones[zone].target.format(chain=SHORTCUTS["INPUT"],
- zone=zone)
+ target = DEFAULT_ZONE_TARGET.format(chain=SHORTCUTS["INPUT"],
+ zone=zone)
command = [ ]
self.__rule_source(rule.source, command)
@@ -841,8 +841,8 @@ class FirewallZone:
table = "filter"
chains.append([ table, "INPUT" ])
- target = self._zones[zone].target.format(chain=SHORTCUTS["INPUT"],
- zone=zone)
+ target = DEFAULT_ZONE_TARGET.format(chain=SHORTCUTS["INPUT"],
+ zone=zone)
command = [ ]
self.__rule_source(rule.source, command)