libvirt/tests/networkxml2firewalldata/base.nftables
Laine Stump aabf279ca0 tests: fix broken nftables test data so that individual tests are successful
When the chain names and table name used by the nftables firewall
backend were changed in commit
958aa7f274, I forgot to change the test
data file base.nftables, which has the extra "list" and "add
chain/table" commands that are generated for the first test case of
networkxml2firewalltest.c. When the full set of tests is run, the
first test will be an iptables test case, so those extra commands
won't be added to any of the nftables cases, and so the data in
base.nftables never matches, and the tests are all successful.

However, if the test are limited with, e.g. VIR_TEST_RANGE=2 (test #2
will be the nftables version of the 1st test case), then the commands
to add nftables table/chains *will* be generated in the test output,
and so the test will fail. Because I was only running the entire test
series after the initial commits of nftables tests, I didn't notice
this. Until now.

base.nftables has now been updated to reflect the current names for
chains/table, and running individual test cases is once again
successful.

Fixes: 958aa7f274
Reviewed-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Laine Stump <laine@redhat.com>
2024-06-24 13:49:26 +01:00

139 lines
1.4 KiB
Plaintext

nft \
list \
table \
ip \
libvirt_network
nft \
add \
table \
ip \
libvirt_network
nft \
add \
chain \
ip \
libvirt_network \
forward \
'{ type filter hook forward priority 0; policy accept; }'
nft \
add \
chain \
ip \
libvirt_network \
guest_output
nft \
insert \
rule \
ip \
libvirt_network \
forward \
counter \
jump \
guest_output
nft \
add \
chain \
ip \
libvirt_network \
guest_input
nft \
insert \
rule \
ip \
libvirt_network \
forward \
counter \
jump \
guest_input
nft \
add \
chain \
ip \
libvirt_network \
guest_cross
nft \
insert \
rule \
ip \
libvirt_network \
forward \
counter \
jump \
guest_cross
nft \
add \
chain \
ip \
libvirt_network \
guest_nat \
'{ type nat hook postrouting priority 100; policy accept; }'
nft \
list \
table \
ip6 \
libvirt_network
nft \
add \
table \
ip6 \
libvirt_network
nft \
add \
chain \
ip6 \
libvirt_network \
forward \
'{ type filter hook forward priority 0; policy accept; }'
nft \
add \
chain \
ip6 \
libvirt_network \
guest_output
nft \
insert \
rule \
ip6 \
libvirt_network \
forward \
counter \
jump \
guest_output
nft \
add \
chain \
ip6 \
libvirt_network \
guest_input
nft \
insert \
rule \
ip6 \
libvirt_network \
forward \
counter \
jump \
guest_input
nft \
add \
chain \
ip6 \
libvirt_network \
guest_cross
nft \
insert \
rule \
ip6 \
libvirt_network \
forward \
counter \
jump \
guest_cross
nft \
add \
chain \
ip6 \
libvirt_network \
guest_nat \
'{ type nat hook postrouting priority 100; policy accept; }'