Martin Loviska changed bug 1114673
What Removed Added
CC   mloviska@suse.com

Comment # 19 on bug 1114673 from
yast2-firewall-4.1.10-1.2            (openSUSE)    openSUSE Tumbleweed

Despite that NIC ens4 has been assigned to zone public in the interfaces
option, it is not present in the list of interfaces assigned to zone public.
https://openqa.opensuse.org/tests/881879#step/yast2_firewall/79

Zone configuration:
https://openqa.opensuse.org/tests/881879#step/yast2_firewall/58

Interfaces:
https://openqa.opensuse.org/tests/881879#step/yast2_firewall/51

There is an issue with missing "allowed:trusted" widget, also.

2019-03-16 19:42:22 <2> susetest(4790) [ui] YWidget.cc(findWidget):635    
THROW:    No widget with ID "allowed:trusted"
2019-03-16 19:42:22 <2> susetest(4790) [ui] YCP_UI.cc(ChangeWidget):728    
CAUGHT:   No widget with ID "allowed:trusted"
2019-03-16 19:42:22 <3> susetest(4790) [libycp] cwm/table.rb:48
UI::ChangeWidget failed: UI::ChangeWidget( `id ("allowed:trusted"), `Items, []
)
2019-03-16 19:42:22 <2> susetest(4790) [ui] YWidget.cc(findWidget):635    
THROW:    No widget with ID "allowed:trusted"
2019-03-16 19:42:22 <2> susetest(4790) [ui] YCP_UI.cc(ChangeWidget):728    
CAUGHT:   No widget with ID "allowed:trusted"
2019-03-16 19:42:22 <3> susetest(4790) [libycp] cwm/table.rb:62
UI::ChangeWidget failed: UI::ChangeWidget( `id ("allowed:trusted"),
`SelectedItems, [] )
2019-03-16 19:43:27 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=public", "--list-interfaces"]
2019-03-16 19:43:27 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=public --list-interfaces".
2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: 
2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:28 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=public", "--list-interfaces"]
2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=public --list-interfaces".
2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: 
2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:28 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=public", "--change-interface=ens4"]
2019-03-16 19:43:28 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=public --change-interface\=ens4".
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: The interface is under control of NetworkManager, setting zone to
'public'.
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: success
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=trusted", "--list-services"]
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=trusted --list-services".
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: 
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=trusted", "--list-services"]
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=trusted --list-services".
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: 
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=trusted", "--add-service=bitcoin"]
2019-03-16 19:43:29 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=trusted --add-service\=bitcoin".
2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: success
2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:30 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=trusted", "--list-ports"]
2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=trusted --list-ports".
2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: 
2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:30 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=trusted", "--list-ports"]
2019-03-16 19:43:30 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=trusted --list-ports".
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: 
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--permanent", "--zone=trusted", "--add-port=7777/tcp"]
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --permanent --zone\=trusted --add-port\=7777/tcp".
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: success
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] firewalld/api.rb:198 Executing
firewall-cmd with ["--set-default-zone=trusted"]
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:158 Executing
"firewall-cmd --set-default-zone\=trusted".
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:206 Standard
output: success
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] lib/cheetah.rb:178 Status: 0
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] yast2/systemctl.rb:34 systemctl
reload firewalld.service 
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] yast2/systemctl.rb:34 systemctl
show firewalld.service  --property=Id  --property=MainPID 
--property=Description  --property=LoadState  --property=ActiveState 
--property=SubState  --property=UnitFileState  --property=FragmentPath 
--property=CanReload 
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] yast2/systemctl.rb:34 systemctl
show firewalld.service  --property=Id  --property=MainPID 
--property=Description  --property=LoadState  --property=ActiveState 
--property=SubState  --property=UnitFileState  --property=FragmentPath 
--property=CanReload 
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] clients/firewall.rb:73 ret=next
2019-03-16 19:43:31 <1> susetest(4790) [Ruby] clients/firewall.rb:75 Firewall
client finished


You are receiving this mail because: