Fail #2 - stdout mismatch
# -*- compilation -*- 124. rhbz1855140.at:1: testing rich rule icmptypes with one family ... ./rhbz1855140.at:1: if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi ./rhbz1855140.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf ./rhbz1855140.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf ./rhbz1855140.at:1: ip netns add fwd-test-${at_group_normalized} ./rhbz1855140.at:1: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft ./rhbz1855140.at:1: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft ./rhbz1855140.at:1: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index not running running ./rhbz1855140.at:4: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="echo-request" accept' stdout: success ./rhbz1855140.at:5: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="neighbour-advertisement" accept' stdout: success ./rhbz1855140.at:6: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="timestamp-request" accept' stdout: success ./rhbz1855140.at:7: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86' stdout: success ./rhbz1855140.at:8: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload ./rhbz1855140.at:8: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state ./rhbz1855140.at:9: env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" ip netns exec fwd-test-${at_group_normalized} sh <<-"HERE" { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } | sed -e 's/meta mark/mark/g' -e '/type.*hook.*priority.*policy.*/d' -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}' >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1 HERE
--- - 2021-05-10 12:59:11.409337617 +0000 +++ /tmp/autopkgtest.b8ayAF/build.gyK/src/src/tests/testsuite.dir/at-groups/124/stdout 2021-05-10 12:59:11.402697416 +0000 @@ -1,6 +1,6 @@ table inet firewalld { chain mangle_PRE_public_allow { -icmpv6 type parameter-problem icmpv6 code no-route mark set mark & 0x00000086 ^ 0x00000086 +icmpv6 code no-route mark set mark & 0x00000086 ^ 0x00000086 } }
124. rhbz1855140.at:1: 124. rich rule icmptypes with one family (rhbz1855140.at:1): FAILED (rhbz1855140.at:9)
Fail #2 - stdout mismatch
# -*- compilation -*- DEFAULT_ CONFIG} /firewalld. conf" ./firewalld.conf; then exit 77; fi it.*/CleanupOnE xit=no/ ' ./firewalld.conf kend.*/ FirewallBackend =nftables/ ' ./firewalld.conf ${at_group_ normalized} BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} nft -f ./nft_rule_ index.nft BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} rm ./nft_rule_ index.nft BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} nft delete table inet firewalld_ check_rule_ index BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} firewall-cmd --permanent --zone public --add-rich- rule='rule icmp-type name="echo-request" accept' BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} firewall-cmd --permanent --zone public --add-rich- rule='rule icmp-type name="neighbour -advertisement" accept' BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} firewall-cmd --permanent --zone public --add-rich- rule='rule icmp-type name="timestamp -request" accept' BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86' BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} firewall-cmd -q --reload BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} firewall-cmd -q --state BUS_ADDRESS= "unix:abstract= firewalld- testsuite- dbus-system- socket- ${at_group_ normalized} " ip netns exec fwd-test- ${at_group_ normalized} sh <<-"HERE" PRE_public_ allow; echo $? >&3; } | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } | sed -e 's/meta mark/mark/g' -e '/type. *hook.* priority. *policy. */d' -e '/ct \(state\ |status\ )/{s/\( ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}' >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
124. rhbz1855140.at:1: testing rich rule icmptypes with one family ...
./rhbz1855140.at:1: if ! cp "${FIREWALLD_
./rhbz1855140.at:1: sed -i 's/^CleanupOnEx
./rhbz1855140.at:1: sed -i 's/^FirewallBac
./rhbz1855140.at:1: ip netns add fwd-test-
./rhbz1855140.at:1: env DBUS_SYSTEM_
./rhbz1855140.at:1: env DBUS_SYSTEM_
./rhbz1855140.at:1: env DBUS_SYSTEM_
not running
running
./rhbz1855140.at:4: env DBUS_SYSTEM_
stdout:
success
./rhbz1855140.at:5: env DBUS_SYSTEM_
stdout:
success
./rhbz1855140.at:6: env DBUS_SYSTEM_
stdout:
success
./rhbz1855140.at:7: env DBUS_SYSTEM_
stdout:
success
./rhbz1855140.at:8: env DBUS_SYSTEM_
./rhbz1855140.at:8: env DBUS_SYSTEM_
./rhbz1855140.at:9: env DBUS_SYSTEM_
{ { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_
HERE
--- - 2021-05-10 12:59:11.409337617 +0000 t.b8ayAF/ build.gyK/ src/src/ tests/testsuite .dir/at- groups/ 124/stdout 2021-05-10 12:59:11.402697416 +0000 PRE_public_ allow {
+++ /tmp/autopkgtes
@@ -1,6 +1,6 @@
table inet firewalld {
chain mangle_
-icmpv6 type parameter-problem icmpv6 code no-route mark set mark & 0x00000086 ^ 0x00000086
+icmpv6 code no-route mark set mark & 0x00000086 ^ 0x00000086
}
}
124. rhbz1855140.at:1: 124. rich rule icmptypes with one family (rhbz1855140.at:1): FAILED (rhbz1855140.at:9)