Fail #1 - stdout mismatch
# -*- compilation -*- 97. icmp_block_in_forward_chain.at:1: testing ICMP block present FORWARD chain ... ./icmp_block_in_forward_chain.at:1: if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi ./icmp_block_in_forward_chain.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf ./icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf ./icmp_block_in_forward_chain.at:1: ip netns add fwd-test-${at_group_normalized} ./icmp_block_in_forward_chain.at:1: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft ./icmp_block_in_forward_chain.at:1: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft ./icmp_block_in_forward_chain.at:1: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index not running running ./icmp_block_in_forward_chain.at:4: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited ./icmp_block_in_forward_chain.at:6: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} sh <<-"HERE" { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } | sed -e 's/meta mark/mark/g' -e '/type.*hook.*priority.*policy.*/d' -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}' >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1 HERE
--- - 2021-05-10 12:53:27.518505435 +0000 +++ /tmp/autopkgtest.b8ayAF/build.gyK/src/src/tests/testsuite.dir/at-groups/97/stdout 2021-05-10 12:53:27.513423335 +0000 @@ -1,6 +1,6 @@ table inet firewalld { chain filter_IN_public_deny { -icmp type destination-unreachable icmp code host-prohibited reject with icmpx type admin-prohibited +icmp code host-prohibited reject with icmpx type admin-prohibited } }
97. icmp_block_in_forward_chain.at:1: 97. ICMP block present FORWARD chain (icmp_block_in_forward_chain.at:1): FAILED (icmp_block_in_forward_chain.at:6)
Fail #1 - stdout mismatch
# -*- compilation -*- in_forward_ chain.at: 1: testing ICMP block present FORWARD chain ... block_in_ forward_ chain.at: 1: if ! cp "${FIREWALLD_ DEFAULT_ CONFIG} /firewalld. conf" ./firewalld.conf; then exit 77; fi block_in_ forward_ chain.at: 1: sed -i 's/^CleanupOnEx it.*/CleanupOnE xit=no/ ' ./firewalld.conf block_in_ forward_ chain.at: 1: sed -i 's/^FirewallBac kend.*/ FirewallBackend =nftables/ ' ./firewalld.conf block_in_ forward_ chain.at: 1: ip netns add fwd-test- ${at_group_ normalized} block_in_ forward_ chain.at: 1: env DBUS_SYSTEM_ BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} nft -f ./nft_rule_ index.nft block_in_ forward_ chain.at: 1: env DBUS_SYSTEM_ BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} rm ./nft_rule_ index.nft block_in_ forward_ chain.at: 1: env DBUS_SYSTEM_ BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} nft delete table inet firewalld_ check_rule_ index block_in_ forward_ chain.at: 4: env DBUS_SYSTEM_ BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} firewall-cmd -q --zone=public --add-icmp- block=host- prohibited block_in_ forward_ chain.at: 6: env DBUS_SYSTEM_ BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} sh <<-"HERE" IN_public_ deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } | sed -e 's/meta mark/mark/g' -e '/type. *hook.* priority. *policy. */d' -e '/ct \(state\ |status\ )/{s/\( ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}' >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
97. icmp_block_
./icmp_
./icmp_
./icmp_
./icmp_
./icmp_
./icmp_
./icmp_
not running
running
./icmp_
./icmp_
{ { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_
HERE
--- - 2021-05-10 12:53:27.518505435 +0000 t.b8ayAF/ build.gyK/ src/src/ tests/testsuite .dir/at- groups/ 97/stdout 2021-05-10 12:53:27.513423335 +0000 IN_public_ deny { unreachable icmp code host-prohibited reject with icmpx type admin-prohibited
+++ /tmp/autopkgtes
@@ -1,6 +1,6 @@
table inet firewalld {
chain filter_
-icmp type destination-
+icmp code host-prohibited reject with icmpx type admin-prohibited
}
}
97. icmp_block_ in_forward_ chain.at: 1: 97. ICMP block present FORWARD chain (icmp_block_ in_forward_ chain.at: 1): FAILED (icmp_block_ in_forward_ chain.at: 6)