{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":95676279,"defaultBranch":"master","name":"firewalld","ownerLogin":"erig0","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2017-06-28T14:13:52.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/313253?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1721845530.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"2ed124b0b65efe55efd356965ed6aabf6c855192","ref":"refs/heads/stable-2.2","pushedAt":"2024-07-24T18:25:30.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"chore(release): v2.2.1","shortMessageHtmlLink":"chore(release): v2.2.1"}},{"before":"beb876689d160d204094c1b04f7fa4fe6e592a5f","after":"c77bdf3f7156c4296c30b82734a781c807ef6112","ref":"refs/heads/RHEL-50339","pushedAt":"2024-07-24T17:45:19.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"fix(nftables): make sure probe table is deleted\n\nIn some cases the probe table may be left around.\n\nFixes: becd083fc290 (\"feat(nftables): table ownership\")","shortMessageHtmlLink":"fix(nftables): make sure probe table is deleted"}},{"before":null,"after":"beb876689d160d204094c1b04f7fa4fe6e592a5f","ref":"refs/heads/RHEL-50339","pushedAt":"2024-07-24T17:43:49.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"fix(nftables): make sure probe table is deleted\n\nIn some cases the probe table may be left around.\n\nFixes: becd083fc290 (\"feat(nftables): table ownership\")","shortMessageHtmlLink":"fix(nftables): make sure probe table is deleted"}},{"before":"816f8d1b669040aee8b11ae6cae744f708ceb7ee","after":"0ef773a9b796ee3f33f92e978fe3b0394ef94929","ref":"refs/heads/stable-2.1","pushedAt":"2024-07-11T16:14:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"chore(release): v2.1.3","shortMessageHtmlLink":"chore(release): v2.1.3"}},{"before":"c5b8af6a1d3753419dade025a085b0e807cde0a3","after":"816f8d1b669040aee8b11ae6cae744f708ceb7ee","ref":"refs/heads/stable-2.1","pushedAt":"2024-07-11T16:02:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(functions): fix iptables normalization for opt field\n\nThe sed expression didn't consume multiple spaces. All of the\nnormalization nuances are stacking. :(\n\n@@ -3,5 +3,5 @@\n IN_public_deny 0 -- ::/0 ::/0\n IN_public_allow 0 -- ::/0 ::/0\n IN_public_post 0 -- ::/0 ::/0\n-ACCEPT 58 -- ::/0 ::/0\n+ACCEPT 58 -- -- ::/0 ::/0\n\nFixes: 9a11ab13c109 (\"test(functions): ip6tables: normalize opt field output\")\n(cherry picked from commit e3f44a77be2f64be1beb7441314c37a9d773c063)","shortMessageHtmlLink":"test(functions): fix iptables normalization for opt field"}},{"before":"f54c3741dceb769732bd6b04125ab63ac6bb59b5","after":"2a9e32fe303bb160d8bb630cb0ec9a23fa67dc42","ref":"refs/heads/stable-2.0","pushedAt":"2024-07-11T15:12:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"chore(release): v2.0.5","shortMessageHtmlLink":"chore(release): v2.0.5"}},{"before":"d79a3f941d02cc80ee7d95cf91c27d596c5ac1b1","after":"8e5e21574380dad4ccc8dcf9a9447682691113d2","ref":"refs/heads/gh1112","pushedAt":"2024-07-01T19:53:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(functions): fix iptables normalization for opt field\n\nThe sed expression didn't consume multiple spaces. All of the\nnormalization nuances are stacking. :(\n\n@@ -3,5 +3,5 @@\n IN_public_deny 0 -- ::/0 ::/0\n IN_public_allow 0 -- ::/0 ::/0\n IN_public_post 0 -- ::/0 ::/0\n-ACCEPT 58 -- ::/0 ::/0\n+ACCEPT 58 -- -- ::/0 ::/0\n\nFixes: 9a11ab13c109 (\"test(functions): ip6tables: normalize opt field output\")","shortMessageHtmlLink":"test(functions): fix iptables normalization for opt field"}},{"before":"f3fe931e0eb52e311bfa14e4d1e835ac120379e5","after":"d79a3f941d02cc80ee7d95cf91c27d596c5ac1b1","ref":"refs/heads/gh1112","pushedAt":"2024-07-01T19:51:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(functions): fix iptables normalization for opt field\n\nThe sed expression didn't consume multiple spaces. All of the\nnormalization nuances are stacking. :(\n\n@@ -3,5 +3,5 @@\n IN_public_deny 0 -- ::/0 ::/0\n IN_public_allow 0 -- ::/0 ::/0\n IN_public_post 0 -- ::/0 ::/0\n-ACCEPT 58 -- ::/0 ::/0\n+ACCEPT 58 -- -- ::/0 ::/0","shortMessageHtmlLink":"test(functions): fix iptables normalization for opt field"}},{"before":"e312ffabd4625d634d7abfa960c958f011ed7918","after":"f3fe931e0eb52e311bfa14e4d1e835ac120379e5","ref":"refs/heads/gh1112","pushedAt":"2024-07-01T19:11:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(functions): fix iptables normalization for opt field\n\nThe sed expression didn't consume multiple spaces. All of the\nnormalization nuances are stacking. :(\n\n@@ -3,5 +3,5 @@\n IN_public_deny 0 -- ::/0 ::/0\n IN_public_allow 0 -- ::/0 ::/0\n IN_public_post 0 -- ::/0 ::/0\n-ACCEPT 58 -- ::/0 ::/0\n+ACCEPT 58 -- -- ::/0 ::/0","shortMessageHtmlLink":"test(functions): fix iptables normalization for opt field"}},{"before":"464c96c4451b590e2474d38eeb16ec806c29442a","after":"21704d9a429c6d70463a90e3f62d1b1de67c810b","ref":"refs/heads/RHEL-17002","pushedAt":"2024-06-26T19:40:46.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"chore(service): remove Conflicts with nftables\n\nNow that firewalld uses the table owner flag it can coexist with the\nnftables service.","shortMessageHtmlLink":"chore(service): remove Conflicts with nftables"}},{"before":"8bc16e4f43b3a91bc3f311f8cee5592e0237cb2d","after":"464c96c4451b590e2474d38eeb16ec806c29442a","ref":"refs/heads/RHEL-17002","pushedAt":"2024-06-26T13:07:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(nftables): table ownership\n\nCoverage: RHEL-17002","shortMessageHtmlLink":"test(nftables): table ownership"}},{"before":"4a8c945ab5e3e353af3c77afb9fd2ccabfda53ee","after":"8bc16e4f43b3a91bc3f311f8cee5592e0237cb2d","ref":"refs/heads/RHEL-17002","pushedAt":"2024-06-26T12:45:29.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(nftables): table ownership\n\nCoverage: RHEL-17002","shortMessageHtmlLink":"test(nftables): table ownership"}},{"before":"808a47bdf83b09b46224f4ef83142ac1d1e8101b","after":"4a8c945ab5e3e353af3c77afb9fd2ccabfda53ee","ref":"refs/heads/RHEL-17002","pushedAt":"2024-06-26T12:34:25.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(nftables): table ownership\n\nCoverage: RHEL-17002","shortMessageHtmlLink":"test(nftables): table ownership"}},{"before":"b83c2c2f9ab8ac9205debd8d6a45cb6f4c175753","after":"808a47bdf83b09b46224f4ef83142ac1d1e8101b","ref":"refs/heads/RHEL-17002","pushedAt":"2024-06-25T21:33:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(nftables): table ownership\n\nCoverage: RHEL-17002","shortMessageHtmlLink":"test(nftables): table ownership"}},{"before":null,"after":"b83c2c2f9ab8ac9205debd8d6a45cb6f4c175753","ref":"refs/heads/RHEL-17002","pushedAt":"2024-06-21T21:42:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(nftables): table ownership\n\nCoverage: RHEL-17002","shortMessageHtmlLink":"test(nftables): table ownership"}},{"before":"7ca7bc75d77bdba34dcbfdc4d905b06257e18993","after":"7850fbf06899efcb9f1bfe02f718e5f5c06a4c4d","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-24T17:39:00.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support strict-forward rpfilter","shortMessageHtmlLink":"feat(IPv6_rpfilter): support strict-forward rpfilter"}},{"before":"a323f9cef9afcd0c7b5c0014a014868b465efdb7","after":"7ca7bc75d77bdba34dcbfdc4d905b06257e18993","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-24T17:37:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support strict-forward rpfilter","shortMessageHtmlLink":"feat(IPv6_rpfilter): support strict-forward rpfilter"}},{"before":"e695829b6451e2f71d88c913b07e21d21030d104","after":"a323f9cef9afcd0c7b5c0014a014868b465efdb7","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-17T14:53:54.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support strict-forward rpfilter","shortMessageHtmlLink":"feat(IPv6_rpfilter): support strict-forward rpfilter"}},{"before":"90fe6b3088f4bff7ae8cc12204f3a2501eb3b75d","after":"e695829b6451e2f71d88c913b07e21d21030d104","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-17T14:49:16.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support strict-forward rpfilter","shortMessageHtmlLink":"feat(IPv6_rpfilter): support strict-forward rpfilter"}},{"before":"9d95c899a906be929372131f1e1b2f7ee3603544","after":"90fe6b3088f4bff7ae8cc12204f3a2501eb3b75d","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-17T14:47:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support strict-forward only rpfilter","shortMessageHtmlLink":"feat(IPv6_rpfilter): support strict-forward only rpfilter"}},{"before":"00626c701cd599205bd5de2ef00e47713bef1456","after":"9d95c899a906be929372131f1e1b2f7ee3603544","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-16T15:57:43.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"loose\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a single default route because the RPF check\nis completely absent on INPUT.\n\nThis new value is NOT compatible with the iptables backend. This is\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"23424812b46c5ca76ee1147060ad45989c2040cf","after":"00626c701cd599205bd5de2ef00e47713bef1456","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-16T14:46:13.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"strict\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a single default route because the RPF check\nis completely absent on INPUT.\n\nThis new value is NOT compatible with the iptables backend. This is\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"8557b835c80f41513841bee5de309105ea79c336","after":"23424812b46c5ca76ee1147060ad45989c2040cf","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-16T14:35:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"strict\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a single default route because the RPF check\nis completely absent on INPUT.\n\nThis new value is NOT compatible with the iptables backend. This is\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"6f33560ee9dbf443a955fe355128d4f6b86189de","after":"8557b835c80f41513841bee5de309105ea79c336","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-14T23:08:54.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"loose\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a default route because the RPF check is\ncompletely absent on INPUT. The theory is that most end-stations have a\ndefault route so the loose RPF check would always pass for packets\ndestined to the host.\n\nThis new value is NOT compatible with the iptables backend. This is\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"3589fc73c89349d90578e8d9846eab1460e32c7e","after":"6f33560ee9dbf443a955fe355128d4f6b86189de","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-14T22:51:13.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"loose\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a default route because the RPF check is\ncompletely absent on INPUT. The theory is that most end-stations have a\ndefault route so the loose RPF check would always pass for packets\ndestined to the host.\n\nThis new value is NOT compatible with the iptables backend. This is\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"2a4fa414751dd3a85a57e6f21dc65a2e57892a5c","after":"3589fc73c89349d90578e8d9846eab1460e32c7e","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-14T22:49:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"loose\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a default route because the RPF check is\ncompletely absent on INPUT. The theory is that most end-stations have a\ndefault route so the loose RPF check would always pass for packets\ndestined to the host.\n\nThis new value is NOT compatible with the iptables backend. This is\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"2b4495812ecf9c9a7559ef734508291b38b718bf","after":"2a4fa414751dd3a85a57e6f21dc65a2e57892a5c","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-14T19:41:29.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"loose\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a default route because the RPF check is\ncompletely absent on INPUT. The theory is that most end-stations have a\ndefault route so the loose RPF check would always pass for packets\ndestined to the host.\n\nThis new value is NOT compatible with the iptables backend. This is\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"9ddeb98946f376aa505176754bf98fc916ce737d","after":"2b4495812ecf9c9a7559ef734508291b38b718bf","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-14T19:40:36.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"loose\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a default route because the RPF check is\ncompletely absent on INPUT. The theory is that most end-stations have a\ndefault route so the loose RPF check would always pass for packets\ndestined to the host.\n\nThis new value is NOT compatible with the iptables backend. This\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"d57ed30e917cba6635c7b18ec16c2d708fd54b5b","after":"9ddeb98946f376aa505176754bf98fc916ce737d","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-14T19:34:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"feat(IPv6_rpfilter): support forward only rpfilter\n\nThis adds a new config value for IPv6_rpfilter, forward. In this mode\nthe rpfilter occurs only for forwarded packets using the \"loose\"\nalgorithm from RFC 3704. This is a significant performance improvement\nfor end-stations that have a default route because the RPF check is\ncompletely absent on INPUT. The theory is that most end-stations have a\ndefault route so the loose RPF check would always pass for packets\ndestined to the host.\n\nThis new value is NOT compatible with the iptables backend. This\nenforced by configuration checks.","shortMessageHtmlLink":"feat(IPv6_rpfilter): support forward only rpfilter"}},{"before":"e90b9e89199e0b2b6ab9c7c830c858df4470cf35","after":"d57ed30e917cba6635c7b18ec16c2d708fd54b5b","ref":"refs/heads/RHEL-33330","pushedAt":"2024-05-13T18:35:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"erig0","name":"Eric Garver","path":"/erig0","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/313253?s=80&v=4"},"commit":{"message":"test(IPv6_rpfilter): verify valid values\n\nIncluding the deprecated \"yes\" value.","shortMessageHtmlLink":"test(IPv6_rpfilter): verify valid values"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEiEHsswA","startCursor":null,"endCursor":null}},"title":"Activity ยท erig0/firewalld"}