mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-11-09 23:10:08 +00:00
aabf279ca0
When the chain names and table name used by the nftables firewall backend were changed in commit958aa7f274
, I forgot to change the test data file base.nftables, which has the extra "list" and "add chain/table" commands that are generated for the first test case of networkxml2firewalltest.c. When the full set of tests is run, the first test will be an iptables test case, so those extra commands won't be added to any of the nftables cases, and so the data in base.nftables never matches, and the tests are all successful. However, if the test are limited with, e.g. VIR_TEST_RANGE=2 (test #2 will be the nftables version of the 1st test case), then the commands to add nftables table/chains *will* be generated in the test output, and so the test will fail. Because I was only running the entire test series after the initial commits of nftables tests, I didn't notice this. Until now. base.nftables has now been updated to reflect the current names for chains/table, and running individual test cases is once again successful. Fixes:958aa7f274
Reviewed-by: Michal Privoznik <mprivozn@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> Signed-off-by: Laine Stump <laine@redhat.com>
139 lines
1.4 KiB
Plaintext
139 lines
1.4 KiB
Plaintext
nft \
|
|
list \
|
|
table \
|
|
ip \
|
|
libvirt_network
|
|
nft \
|
|
add \
|
|
table \
|
|
ip \
|
|
libvirt_network
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip \
|
|
libvirt_network \
|
|
forward \
|
|
'{ type filter hook forward priority 0; policy accept; }'
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip \
|
|
libvirt_network \
|
|
guest_output
|
|
nft \
|
|
insert \
|
|
rule \
|
|
ip \
|
|
libvirt_network \
|
|
forward \
|
|
counter \
|
|
jump \
|
|
guest_output
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip \
|
|
libvirt_network \
|
|
guest_input
|
|
nft \
|
|
insert \
|
|
rule \
|
|
ip \
|
|
libvirt_network \
|
|
forward \
|
|
counter \
|
|
jump \
|
|
guest_input
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip \
|
|
libvirt_network \
|
|
guest_cross
|
|
nft \
|
|
insert \
|
|
rule \
|
|
ip \
|
|
libvirt_network \
|
|
forward \
|
|
counter \
|
|
jump \
|
|
guest_cross
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip \
|
|
libvirt_network \
|
|
guest_nat \
|
|
'{ type nat hook postrouting priority 100; policy accept; }'
|
|
nft \
|
|
list \
|
|
table \
|
|
ip6 \
|
|
libvirt_network
|
|
nft \
|
|
add \
|
|
table \
|
|
ip6 \
|
|
libvirt_network
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip6 \
|
|
libvirt_network \
|
|
forward \
|
|
'{ type filter hook forward priority 0; policy accept; }'
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip6 \
|
|
libvirt_network \
|
|
guest_output
|
|
nft \
|
|
insert \
|
|
rule \
|
|
ip6 \
|
|
libvirt_network \
|
|
forward \
|
|
counter \
|
|
jump \
|
|
guest_output
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip6 \
|
|
libvirt_network \
|
|
guest_input
|
|
nft \
|
|
insert \
|
|
rule \
|
|
ip6 \
|
|
libvirt_network \
|
|
forward \
|
|
counter \
|
|
jump \
|
|
guest_input
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip6 \
|
|
libvirt_network \
|
|
guest_cross
|
|
nft \
|
|
insert \
|
|
rule \
|
|
ip6 \
|
|
libvirt_network \
|
|
forward \
|
|
counter \
|
|
jump \
|
|
guest_cross
|
|
nft \
|
|
add \
|
|
chain \
|
|
ip6 \
|
|
libvirt_network \
|
|
guest_nat \
|
|
'{ type nat hook postrouting priority 100; policy accept; }'
|