http://bugzilla.suse.com/show_bug.cgi?id=1114673 http://bugzilla.suse.com/show_bug.cgi?id=1114673#c19 Martin Loviska <mloviska@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mloviska@suse.com --- Comment #19 from Martin Loviska <mloviska@suse.com> --- yast2-firewall-4.1.10-1.2 (openSUSE) openSUSE Tumbleweed Despite that NIC ens4 has been assigned to zone public in the interfaces option, it is not present in the list of interfaces assigned to zone public. https://openqa.opensuse.org/tests/881879#step/yast2_firewall/79 Zone configuration: https://openqa.opensuse.org/tests/881879#step/yast2_firewall/58 Interfaces: https://openqa.opensuse.org/tests/881879#step/yast2_firewall/51 There is an issue with missing "allowed:trusted" widget, also. 2019-03-16 19:42:22 <2> susetest(4790) [ui] YWidget.cc(findWidget):635 THROW: No widget with ID "allowed:trusted" 2019-03-16 19:42:22 <2> susetest(4790) [ui] YCP_UI.cc(ChangeWidget):728 CAUGHT: No widget with ID "allowed:trusted" 2019-03-16 19:42:22 <3> susetest(4790) [libycp] cwm/table.rb:48 UI::ChangeWidget failed: UI::ChangeWidget( `id ("allowed:trusted"), `Items, [] ) 2019-03-16 19:42:22 <2> susetest(4790) [ui] YWidget.cc(findWidget):635 THROW: No widget with ID "allowed:trusted" 2019-03-16 19:42:22 <2> susetest(4790) [ui] YCP_UI.cc(ChangeWidget):728 CAUGHT: No widget with ID "allowed:trusted" 2019-03-16 19:42:22 <3> susetest(4790) [libycp] cwm/table.rb:62 UI::ChangeWidget failed: UI::ChangeWidget( `id ("allowed:trusted"), `SelectedItems, [] ) 2019-03-16 19:43:27 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=public", "--list-interfaces"] 2019-03-16 19:43:27 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=public --list-interfaces". 2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: 2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:28 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=public", "--list-interfaces"] 2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=public --list-interfaces". 2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: 2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:28 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=public", "--change-interface=ens4"] 2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=public --change-interface\=ens4". 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: The interface is under control of NetworkManager, setting zone to 'public'. 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: success 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=trusted", "--list-services"] 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=trusted --list-services". 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=trusted", "--list-services"] 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=trusted --list-services". 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=trusted", "--add-service=bitcoin"] 2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=trusted --add-service\=bitcoin". 2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: success 2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:30 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=trusted", "--list-ports"] 2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=trusted --list-ports". 2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: 2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:30 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=trusted", "--list-ports"] 2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=trusted --list-ports". 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--permanent", "--zone=trusted", "--add-port=7777/tcp"] 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --permanent --zone\=trusted --add-port\=7777/tcp". 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: success 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing firewall-cmd with ["--set-default-zone=trusted"] 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing "firewall-cmd --set-default-zone\=trusted". 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard output: success 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] yast2/systemctl.rb:34 systemctl reload firewalld.service 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] yast2/systemctl.rb:34 systemctl show firewalld.service --property=Id --property=MainPID --property=Description --property=LoadState --property=ActiveState --property=SubState --property=UnitFileState --property=FragmentPath --property=CanReload 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] yast2/systemctl.rb:34 systemctl show firewalld.service --property=Id --property=MainPID --property=Description --property=LoadState --property=ActiveState --property=SubState --property=UnitFileState --property=FragmentPath --property=CanReload 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] clients/firewall.rb:73 ret=next 2019-03-16 19:43:31 <1> susetest(4790) [Ruby] clients/firewall.rb:75 Firewall client finished -- You are receiving this mail because: You are on the CC list for the bug.