mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-11-09 15:00:07 +00:00
8afd34f2d8
Back in
commit bd6c46fa0c
Author: Juerg Haefliger <juerg.haefliger@hp.com>
Date: Mon Jan 31 06:42:57 2011 -0500
tests: handle backspace-newline pairs in test input files
all the test argv files were line wrapped so that the args
were less than 80 characters.
The way the line wrapping was done turns out to be quite
undesirable, because it often leaves multiple parameters
on the same line. If we later need to add or remove
individual parameters, then it leaves us having to redo
line wrapping.
This commit changes the line wrapping so that every
single "-param value" is one its own new line. If the
"value" is still too long, then we break on ',' or ':'
or ' ' as needed.
This means that when we come to add / remove parameters
from the test files line, the patch diffs will only
ever show a single line added/removed which will greatly
simplify review work.
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
204 lines
3.9 KiB
Plaintext
204 lines
3.9 KiB
Plaintext
iptables \
|
|
--table filter \
|
|
--insert INPUT \
|
|
--in-interface virbr0 \
|
|
--protocol tcp \
|
|
--destination-port 67 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert INPUT \
|
|
--in-interface virbr0 \
|
|
--protocol udp \
|
|
--destination-port 67 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert OUTPUT \
|
|
--out-interface virbr0 \
|
|
--protocol udp \
|
|
--destination-port 68 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert INPUT \
|
|
--in-interface virbr0 \
|
|
--protocol tcp \
|
|
--destination-port 53 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert INPUT \
|
|
--in-interface virbr0 \
|
|
--protocol udp \
|
|
--destination-port 53 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--in-interface virbr0 \
|
|
--jump REJECT
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--out-interface virbr0 \
|
|
--jump REJECT
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--in-interface virbr0 \
|
|
--out-interface virbr0 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--source 192.168.122.0/24 \
|
|
--in-interface virbr0 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--destination 192.168.122.0/24 \
|
|
--out-interface virbr0 \
|
|
--match conntrack \
|
|
--ctstate ESTABLISHED,RELATED \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.122.0/24 '!' \
|
|
--destination 192.168.122.0/24 \
|
|
--jump MASQUERADE
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.122.0/24 \
|
|
-p udp '!' \
|
|
--destination 192.168.122.0/24 \
|
|
--jump MASQUERADE \
|
|
--to-ports 1024-65535
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.122.0/24 \
|
|
-p tcp '!' \
|
|
--destination 192.168.122.0/24 \
|
|
--jump MASQUERADE \
|
|
--to-ports 1024-65535
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.122.0/24 \
|
|
--destination 255.255.255.255/32 \
|
|
--jump RETURN
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.122.0/24 \
|
|
--destination 224.0.0.0/24 \
|
|
--jump RETURN
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--source 192.168.128.0/24 \
|
|
--in-interface virbr0 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--destination 192.168.128.0/24 \
|
|
--out-interface virbr0 \
|
|
--match conntrack \
|
|
--ctstate ESTABLISHED,RELATED \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.128.0/24 '!' \
|
|
--destination 192.168.128.0/24 \
|
|
--jump MASQUERADE
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.128.0/24 \
|
|
-p udp '!' \
|
|
--destination 192.168.128.0/24 \
|
|
--jump MASQUERADE \
|
|
--to-ports 1024-65535
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.128.0/24 \
|
|
-p tcp '!' \
|
|
--destination 192.168.128.0/24 \
|
|
--jump MASQUERADE \
|
|
--to-ports 1024-65535
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.128.0/24 \
|
|
--destination 255.255.255.255/32 \
|
|
--jump RETURN
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.128.0/24 \
|
|
--destination 224.0.0.0/24 \
|
|
--jump RETURN
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--source 192.168.150.0/24 \
|
|
--in-interface virbr0 \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table filter \
|
|
--insert FORWARD \
|
|
--destination 192.168.150.0/24 \
|
|
--out-interface virbr0 \
|
|
--match conntrack \
|
|
--ctstate ESTABLISHED,RELATED \
|
|
--jump ACCEPT
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.150.0/24 '!' \
|
|
--destination 192.168.150.0/24 \
|
|
--jump MASQUERADE
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.150.0/24 \
|
|
-p udp '!' \
|
|
--destination 192.168.150.0/24 \
|
|
--jump MASQUERADE \
|
|
--to-ports 1024-65535
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.150.0/24 \
|
|
-p tcp '!' \
|
|
--destination 192.168.150.0/24 \
|
|
--jump MASQUERADE \
|
|
--to-ports 1024-65535
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.150.0/24 \
|
|
--destination 255.255.255.255/32 \
|
|
--jump RETURN
|
|
iptables \
|
|
--table nat \
|
|
--insert POSTROUTING \
|
|
--source 192.168.150.0/24 \
|
|
--destination 224.0.0.0/24 \
|
|
--jump RETURN
|
|
iptables \
|
|
--table mangle \
|
|
--insert POSTROUTING \
|
|
--out-interface virbr0 \
|
|
--protocol udp \
|
|
--destination-port 68 \
|
|
--jump CHECKSUM \
|
|
--checksum-fill
|